Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

451.

In Network Management System, a term that responsible for controlling access to network based on predefined policy is called

A. Fault Management
B. Secured Management
C. Active Management
D. Security Management
Answer» E.
452.

Main difference between SNMPv3 and SNMPv2 is the

A. Management
B. Integration
C. Classification
D. Enhanced security
Answer» E.
453.

To use Simple Network Management System (SNMP), we need

A. Servers
B. IP
C. Protocols
D. Rules
Answer» E.
454.

Configuration management can be divided into two subsystems those are

A. Reconfiguration and documentation
B. Management and configuration
C. Documentation and dialing up
D. Both Reconfiguration and documentation and Management and configuration
Answer» B. Management and configuration
455.

Full duplex mode increases capacity of each domain from

A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer» B. 20 to 30 mbps
456.

An application-level protocol in which a few manager stations control a set of agents is called

A. HTML
B. TCP
C. SNMP
D. SNMP/IP
Answer» D. SNMP/IP
457.

SMI-S Standard uses

A. Java RMI
B. CIM-XML/HTTP
C. CORBA
D. .NET
Answer» C. CORBA
458.

Task of Distributed Management Task Force is to

A. To promote interoperability among the management solution providers
B. Acts as an interface between the various budding technologies and provide solution to manage various environments
C. Only To promote interoperability among the management solution providers
D. Both To promote interoperability among the management solution providers and Acts as an interface between the various budding technologies and provide solution to manage various environments
Answer» E.
459.

Effect of open standards like SMI(s)

A. Standardization drives software interoperability and interchange ability
B. Breaks the old-style dependence on proprietary methods, trade secrets, and single providers
C. Builds a strong foundation on which others can quickly build and innovate
D. All of the mentioned
Answer» E.
460.

Identify the tasks involved in Storage Capacity management

A. Identifying storage systems are approaching full capacity
B. Monitoring trends for each resource
C. Tracking Total capacity, total used, total available
D. All of the mentioned
Answer» E.
461.

Effective Storage management includes

A. Securities
B. Backups
C. Reporting
D. All of the mentioned
Answer» E.
462.

How do Storage administrators ensure secure access to storage devices:

A. By using Zoning
B. By putting a physical lock on the storage device
C. By keeping devices shutdown when not in use
D. By keeping devices when used
Answer» B. By putting a physical lock on the storage device
463.

Identify the difficulties the SAN administrator incur while dealing with diverse vendors

A. Proprietary management interfaces
B. Multiple applications to manage storage in the data center
C. No single view
D. All of the mentioned
Answer» E.
464.

Which protocols are used for Storage management?

A. SNMP
B. LDAP
C. POP3
D. MIB
Answer» B. LDAP
465.

Identify the storage devices

A. Switch
B. RAID Arrays
C. Tape drives
D. All of the mentioned
Answer» E.
466.

Storage management comprises of

A. SAN Management
B. Data protection
C. Disk operation
D. All of the mentioned
Answer» E.
467.

Which layer of the OSI reference model does IPsec work at?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer» D. Layer 4
468.

Which layer of the OSI reference model does PPTP work at?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer» C. Layer 3
469.

L2F was developed by which company?

A. Microsoft
B. Cisco
C. Blizzard Entertainment
D. IETF
Answer» C. Blizzard Entertainment
470.

ESP (Encapsulating Security Protocol) is defined in which of the following standards?

A. IPsec
B. PPTP
C. PPP
D. L2TP
Answer» B. PPTP
471.

Which layer 3 protocols can be transmitted over a L2TP VPN?

A. IP
B. IPX
C. Neither IP or IPX
D. Both IP or IPX
Answer» E.
472.

VPNs are financially speaking __________

A. Always more expensive than leased lines
B. Always cheaper than leased lines
C. Usually cheaper than leased lines
D. Usually more expensive than leased lines
Answer» D. Usually more expensive than leased lines
473.

Traffic in a VPN is NOT ____________

A. Invisible from public networks
B. Logically separated from other traffic
C. Accessible from unauthorized public networks
D. Restricted to a single protocol in IPsec
Answer» D. Restricted to a single protocol in IPsec
474.

Which of the following statements is NOT true concerning VPNs?

A. Financially rewarding compared to leased lines
B. Allows remote workers to access corporate data
C. Allows LAN-to-LAN connectivity over public networks
D. Is the backbone of the Internet
Answer» E.
475.

What protocol is NOT used in the operation of a VPN?

A. PPTP
B. IPsec
C. YMUM
D. L2TP
Answer» D. L2TP
476.

When were VPNs introduced into the commercial world?

A. Early 80’s
B. Late 80’s
C. Early 90’s
D. Late 90’s
Answer» E.
477.

A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.

A. VNP
B. VPN
C. VSN
D. VSPN
Answer» C. VSN
478.

When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called

A. DNS lookup
B. DNS hijacking
C. DNS spoofing
D. None of the mentioned
Answer» D. None of the mentioned
479.

PGP encrypts data by using a block cipher called

A. International data encryption algorithm
B. Private data encryption algorithm
C. Internet data encryption algorithm
D. None of the mentioned
Answer» B. Private data encryption algorithm
480.

Pretty good privacy (PGP) is used in

A. Browser security
B. Email security
C. FTP security
D. None of the mentioned
Answer» C. FTP security
481.

Extensible authentication protocol is authentication framework frequently used in

A. Wired personal area network
B. Wireless networks
C. Wired local area network
D. None of the mentioned
Answer» C. Wired local area network
482.

An attempt to make a computer resource unavailable to its intended users is called

A. Denial-of-service attack
B. Virus attack
C. Worms attack
D. Botnet process
Answer» B. Virus attack
483.

WPA2 is used for security in

A. Ethernet
B. Bluetooth
C. Wi-Fi
D. None of the mentioned
Answer» D. None of the mentioned
484.

Which component is included in IP security?

A. Authentication Header (AH)
B. Encapsulating Security Payload (ESP)
C. Internet key Exchange (IKE)
D. All of the mentioned
Answer» E.
485.

In tunnel mode IPsec protects the

A. Entire IP packet
B. IP header
C. IP payload
D. None of the mentioned
Answer» B. IP header
486.

IPsec is designed to provide the security at the

A. Transport layer
B. Network layer
C. Application layer
D. Session layer
Answer» C. Application layer
487.

If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

A. MAC address
B. IP address
C. Both MAC address and IP address
D. None of the mentioned
Answer» D. None of the mentioned
488.

What is DHCP snooping?

A. techniques applied to ensure the security of an existing DHCP infrastructure
B. encryption of the DHCP server requests
C. algorithm for DHCP
D. none of the mentioned
Answer» B. encryption of the DHCP server requests
489.

After obtaining the IP address, to prevent the IP conflict the client may use

A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer» D. none of the mentioned
490.

DHCP client and servers on the same subnet communicate via

A. UDP broadcast
B. UDP unicast
C. TCP broadcast
D. TCP unicast
Answer» B. UDP unicast
491.

The DHCP server can provide the _______ of the IP addresses.

A. dynamic allocation
B. automatic allocation
C. static allocation
D. all of the mentioned
Answer» E.
492.

DHCP uses UDP port _________ for sending data to the server.

A. 66
B. 67
C. 68
D. 69
Answer» C. 68
493.

IP assigned for a client by DHCP server is

A. for a limited period
B. for unlimited period
C. not time dependent
D. none of the mentioned
Answer» B. for unlimited period
494.

The DHCP server

A. maintains a database of available IP addresses
B. maintains the information about client configuration parameters
C. grants a IP address when receives a request from a client
D. all of the mentioned
Answer» E.
495.

DHCP is used for

A. IPv6
B. IPv4
C. Both IPv6 and IPv4
D. None of the mentioned
Answer» D. None of the mentioned
496.

DHCP (dynamic host configuration protocol) provides __________ to the client.

A. IP address
B. MAC address
C. Url
D. None of the mentioned
Answer» B. MAC address
497.

Which one of the following authentication method is used by SSH?

A. public-key
B. host based
C. password
D. all of the mentioned
Answer» E.
498.

SCP protocol is evolved from __________ over SSH.

A. RCP protocol
B. DHCP protocol
C. MGCP protocol
D. none of the mentioned
Answer» B. DHCP protocol
499.

SSH-2 does not contain

A. transport layer
B. user authentication layer
C. physical layer
D. connection layer
Answer» D. connection layer
500.

Which one of the following is a file transfer protocol using SSH?

A. SCP
B. SFTP
C. Rsync
D. All of the mentioned
Answer» E.