

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
451. |
In Network Management System, a term that responsible for controlling access to network based on predefined policy is called |
A. | Fault Management |
B. | Secured Management |
C. | Active Management |
D. | Security Management |
Answer» E. | |
452. |
Main difference between SNMPv3 and SNMPv2 is the |
A. | Management |
B. | Integration |
C. | Classification |
D. | Enhanced security |
Answer» E. | |
453. |
To use Simple Network Management System (SNMP), we need |
A. | Servers |
B. | IP |
C. | Protocols |
D. | Rules |
Answer» E. | |
454. |
Configuration management can be divided into two subsystems those are |
A. | Reconfiguration and documentation |
B. | Management and configuration |
C. | Documentation and dialing up |
D. | Both Reconfiguration and documentation and Management and configuration |
Answer» B. Management and configuration | |
455. |
Full duplex mode increases capacity of each domain from |
A. | 10 to 20 mbps |
B. | 20 to 30 mbps |
C. | 30 to 40 mbps |
D. | 40 to 50 mbps |
Answer» B. 20 to 30 mbps | |
456. |
An application-level protocol in which a few manager stations control a set of agents is called |
A. | HTML |
B. | TCP |
C. | SNMP |
D. | SNMP/IP |
Answer» D. SNMP/IP | |
457. |
SMI-S Standard uses |
A. | Java RMI |
B. | CIM-XML/HTTP |
C. | CORBA |
D. | .NET |
Answer» C. CORBA | |
458. |
Task of Distributed Management Task Force is to |
A. | To promote interoperability among the management solution providers |
B. | Acts as an interface between the various budding technologies and provide solution to manage various environments |
C. | Only To promote interoperability among the management solution providers |
D. | Both To promote interoperability among the management solution providers and Acts as an interface between the various budding technologies and provide solution to manage various environments |
Answer» E. | |
459. |
Effect of open standards like SMI(s) |
A. | Standardization drives software interoperability and interchange ability |
B. | Breaks the old-style dependence on proprietary methods, trade secrets, and single providers |
C. | Builds a strong foundation on which others can quickly build and innovate |
D. | All of the mentioned |
Answer» E. | |
460. |
Identify the tasks involved in Storage Capacity management |
A. | Identifying storage systems are approaching full capacity |
B. | Monitoring trends for each resource |
C. | Tracking Total capacity, total used, total available |
D. | All of the mentioned |
Answer» E. | |
461. |
Effective Storage management includes |
A. | Securities |
B. | Backups |
C. | Reporting |
D. | All of the mentioned |
Answer» E. | |
462. |
How do Storage administrators ensure secure access to storage devices: |
A. | By using Zoning |
B. | By putting a physical lock on the storage device |
C. | By keeping devices shutdown when not in use |
D. | By keeping devices when used |
Answer» B. By putting a physical lock on the storage device | |
463. |
Identify the difficulties the SAN administrator incur while dealing with diverse vendors |
A. | Proprietary management interfaces |
B. | Multiple applications to manage storage in the data center |
C. | No single view |
D. | All of the mentioned |
Answer» E. | |
464. |
Which protocols are used for Storage management? |
A. | SNMP |
B. | LDAP |
C. | POP3 |
D. | MIB |
Answer» B. LDAP | |
465. |
Identify the storage devices |
A. | Switch |
B. | RAID Arrays |
C. | Tape drives |
D. | All of the mentioned |
Answer» E. | |
466. |
Storage management comprises of |
A. | SAN Management |
B. | Data protection |
C. | Disk operation |
D. | All of the mentioned |
Answer» E. | |
467. |
Which layer of the OSI reference model does IPsec work at? |
A. | Layer 1 |
B. | Layer 2 |
C. | Layer 3 |
D. | Layer 4 |
Answer» D. Layer 4 | |
468. |
Which layer of the OSI reference model does PPTP work at? |
A. | Layer 1 |
B. | Layer 2 |
C. | Layer 3 |
D. | Layer 4 |
Answer» C. Layer 3 | |
469. |
L2F was developed by which company? |
A. | Microsoft |
B. | Cisco |
C. | Blizzard Entertainment |
D. | IETF |
Answer» C. Blizzard Entertainment | |
470. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards? |
A. | IPsec |
B. | PPTP |
C. | PPP |
D. | L2TP |
Answer» B. PPTP | |
471. |
Which layer 3 protocols can be transmitted over a L2TP VPN? |
A. | IP |
B. | IPX |
C. | Neither IP or IPX |
D. | Both IP or IPX |
Answer» E. | |
472. |
VPNs are financially speaking __________ |
A. | Always more expensive than leased lines |
B. | Always cheaper than leased lines |
C. | Usually cheaper than leased lines |
D. | Usually more expensive than leased lines |
Answer» D. Usually more expensive than leased lines | |
473. |
Traffic in a VPN is NOT ____________ |
A. | Invisible from public networks |
B. | Logically separated from other traffic |
C. | Accessible from unauthorized public networks |
D. | Restricted to a single protocol in IPsec |
Answer» D. Restricted to a single protocol in IPsec | |
474. |
Which of the following statements is NOT true concerning VPNs? |
A. | Financially rewarding compared to leased lines |
B. | Allows remote workers to access corporate data |
C. | Allows LAN-to-LAN connectivity over public networks |
D. | Is the backbone of the Internet |
Answer» E. | |
475. |
What protocol is NOT used in the operation of a VPN? |
A. | PPTP |
B. | IPsec |
C. | YMUM |
D. | L2TP |
Answer» D. L2TP | |
476. |
When were VPNs introduced into the commercial world? |
A. | Early 80’s |
B. | Late 80’s |
C. | Early 90’s |
D. | Late 90’s |
Answer» E. | |
477. |
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection. |
A. | VNP |
B. | VPN |
C. | VSN |
D. | VSPN |
Answer» C. VSN | |
478. |
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called |
A. | DNS lookup |
B. | DNS hijacking |
C. | DNS spoofing |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
479. |
PGP encrypts data by using a block cipher called |
A. | International data encryption algorithm |
B. | Private data encryption algorithm |
C. | Internet data encryption algorithm |
D. | None of the mentioned |
Answer» B. Private data encryption algorithm | |
480. |
Pretty good privacy (PGP) is used in |
A. | Browser security |
B. | Email security |
C. | FTP security |
D. | None of the mentioned |
Answer» C. FTP security | |
481. |
Extensible authentication protocol is authentication framework frequently used in |
A. | Wired personal area network |
B. | Wireless networks |
C. | Wired local area network |
D. | None of the mentioned |
Answer» C. Wired local area network | |
482. |
An attempt to make a computer resource unavailable to its intended users is called |
A. | Denial-of-service attack |
B. | Virus attack |
C. | Worms attack |
D. | Botnet process |
Answer» B. Virus attack | |
483. |
WPA2 is used for security in |
A. | Ethernet |
B. | Bluetooth |
C. | Wi-Fi |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
484. |
Which component is included in IP security? |
A. | Authentication Header (AH) |
B. | Encapsulating Security Payload (ESP) |
C. | Internet key Exchange (IKE) |
D. | All of the mentioned |
Answer» E. | |
485. |
In tunnel mode IPsec protects the |
A. | Entire IP packet |
B. | IP header |
C. | IP payload |
D. | None of the mentioned |
Answer» B. IP header | |
486. |
IPsec is designed to provide the security at the |
A. | Transport layer |
B. | Network layer |
C. | Application layer |
D. | Session layer |
Answer» C. Application layer | |
487. |
If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network. |
A. | MAC address |
B. | IP address |
C. | Both MAC address and IP address |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
488. |
What is DHCP snooping? |
A. | techniques applied to ensure the security of an existing DHCP infrastructure |
B. | encryption of the DHCP server requests |
C. | algorithm for DHCP |
D. | none of the mentioned |
Answer» B. encryption of the DHCP server requests | |
489. |
After obtaining the IP address, to prevent the IP conflict the client may use |
A. | internet relay chat |
B. | broader gateway protocol |
C. | address resolution protocol |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
490. |
DHCP client and servers on the same subnet communicate via |
A. | UDP broadcast |
B. | UDP unicast |
C. | TCP broadcast |
D. | TCP unicast |
Answer» B. UDP unicast | |
491. |
The DHCP server can provide the _______ of the IP addresses. |
A. | dynamic allocation |
B. | automatic allocation |
C. | static allocation |
D. | all of the mentioned |
Answer» E. | |
492. |
DHCP uses UDP port _________ for sending data to the server. |
A. | 66 |
B. | 67 |
C. | 68 |
D. | 69 |
Answer» C. 68 | |
493. |
IP assigned for a client by DHCP server is |
A. | for a limited period |
B. | for unlimited period |
C. | not time dependent |
D. | none of the mentioned |
Answer» B. for unlimited period | |
494. |
The DHCP server |
A. | maintains a database of available IP addresses |
B. | maintains the information about client configuration parameters |
C. | grants a IP address when receives a request from a client |
D. | all of the mentioned |
Answer» E. | |
495. |
DHCP is used for |
A. | IPv6 |
B. | IPv4 |
C. | Both IPv6 and IPv4 |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
496. |
DHCP (dynamic host configuration protocol) provides __________ to the client. |
A. | IP address |
B. | MAC address |
C. | Url |
D. | None of the mentioned |
Answer» B. MAC address | |
497. |
Which one of the following authentication method is used by SSH? |
A. | public-key |
B. | host based |
C. | password |
D. | all of the mentioned |
Answer» E. | |
498. |
SCP protocol is evolved from __________ over SSH. |
A. | RCP protocol |
B. | DHCP protocol |
C. | MGCP protocol |
D. | none of the mentioned |
Answer» B. DHCP protocol | |
499. |
SSH-2 does not contain |
A. | transport layer |
B. | user authentication layer |
C. | physical layer |
D. | connection layer |
Answer» D. connection layer | |
500. |
Which one of the following is a file transfer protocol using SSH? |
A. | SCP |
B. | SFTP |
C. | Rsync |
D. | All of the mentioned |
Answer» E. | |