

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
51. |
What is the purpose of a shadow honeypot? |
A. | To flag attacks against known vulnerabilities |
B. | To help reduce false positives in a signature-based IDS |
C. | To randomly check suspicious traffic identified by an anomaly detection system |
D. | To enhance the accuracy of a traditional honeypot |
Answer» D. To enhance the accuracy of a traditional honeypot | |
52. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement? |
A. | Inside the firewall |
B. | Outside the firewall |
C. | Both inside and outside the firewall |
D. | Neither inside the firewall nor outside the firewall. |
Answer» B. Outside the firewall | |
53. |
A false positive can be defined as… |
A. | An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior |
B. | An alert that indicates nefarious activity on a system that is not running on the network |
C. | The lack of an alert for nefarious activity |
D. | Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network |
Answer» E. | |
54. |
Which of the following is an advantage of anomaly detection? |
A. | Rules are easy to define |
B. | Custom protocols can be easily analyzed |
C. | The engine can scale as the rule set grows |
D. | Malicious activity that falls within normal usage patterns is detected |
Answer» D. Malicious activity that falls within normal usage patterns is detected | |
55. |
The local operating system on the server machine passes the incoming packets to the |
A. | server stub |
B. | client stub |
C. | client operating system |
D. | none of the mentioned |
Answer» B. client stub | |
56. |
RPC is a |
A. | synchronous operation |
B. | asynchronous operation |
C. | time independent operation |
D. | none of the mentioned |
Answer» B. asynchronous operation | |
57. |
RPC is used to |
A. | establish a server on remote machine that can respond to queries |
B. | retrieve information by calling a query |
C. | both establish a server on remote machine that can respond to queries and retrieve information by calling a query |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
58. |
An RPC application requires |
A. | specific protocol for client server communication |
B. | a client program |
C. | a server program |
D. | all of the mentioned |
Answer» E. | |
59. |
A remote procedure is uniquely identified by |
A. | program number |
B. | version number |
C. | procedure number |
D. | all of the mentioned |
Answer» E. | |
60. |
RPC works between two processes. These processes must be |
A. | on the same computer |
B. | on different computers connected with a network |
C. | both on the same computer and on different computers connected with a network |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
61. |
RPC allows a computer program to cause a subroutine to execute in |
A. | its own address space |
B. | another address space |
C. | both its own address space and another address space |
D. | none of the mentioned |
Answer» C. both its own address space and another address space | |
62. |
Remote procedure calls is |
A. | inter-process communication |
B. | a single process |
C. | a single thread |
D. | none of the mentioned |
Answer» B. a single process | |
63. |
In RPC, while a server is processing the call, the client is blocked |
A. | unless the client sends an asynchronous request to the server |
B. | unless the call processing is complete |
C. | for the complete duration of the connection |
D. | none of the mentioned |
Answer» B. unless the call processing is complete | |
64. |
An RPC (remote procedure call) is initiated by the |
A. | server |
B. | client |
C. | both server and client |
D. | none of the mentioned |
Answer» C. both server and client | |
65. |
Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data? |
A. | SRTP |
B. | RTCP |
C. | RCP |
D. | None of the mentioned |
Answer» B. RTCP | |
66. |
An RTP header has a minimum size of |
A. | 12 bytes |
B. | 16 bytes |
C. | 24 bytes |
D. | 32 bytes |
Answer» B. 16 bytes | |
67. |
Which one of the following multimedia formats can not be supported by RTP? |
A. | MPEG-4 |
B. | MJPEG |
C. | MPEG |
D. | None of the mentioned |
Answer» E. | |
68. |
RTP can use |
A. | unprevileleged UDP ports |
B. | stream control transmission protocol |
C. | datagram congestion control protocol |
D. | all of the mentioned |
Answer» E. | |
69. |
An RTP session is established for |
A. | each media stream |
B. | all media streams |
C. | some predefined number of media streams |
D. | none of the mentioned |
Answer» B. all media streams | |
70. |
Which protocol provides the synchronization between media streams? |
A. | RTP |
B. | RTCP |
C. | RPC |
D. | None of the mentioned |
Answer» C. RPC | |
71. |
RTP provides the facility of jitter ____________ |
A. | media stream |
B. | expansion |
C. | both media stream and expansion |
D. | none of the mentioned |
Answer» B. expansion | |
72. |
RTP is used to |
A. | carry the media stream |
B. | monitor transmission statistics of streams |
C. | monitor quality of service of streams |
D. | none of the mentioned |
Answer» B. monitor transmission statistics of streams | |
73. |
Real-time transport protocol (RTP) is mostly used in |
A. | streaming media |
B. | video teleconference |
C. | television services |
D. | all of the mentioned |
Answer» E. | |
74. |
What is SDH? |
A. | sdh is similar standard to SONET developed by ITU-T |
B. | synchronous digital hierarchy |
C. | both sdh is similar standard to SONET developed by ITU-T and synchronous digital hierarchy |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
75. |
A unidirectional path switching ring is a network with |
A. | one ring |
B. | two rings |
C. | three rings |
D. | four rings |
Answer» C. three rings | |
76. |
Automatic protection switching in linear network is defined at the |
A. | line layer |
B. | section layer |
C. | photonic layer |
D. | path layer |
Answer» B. section layer | |
77. |
A linear SONET network can be |
A. | point-to-point |
B. | multi-point |
C. | both point-to-point and multi-point |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
78. |
Which one of the following is not true about SONET? |
A. | frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame |
B. | multiplexing is synchronous TDM |
C. | all clocks in the network are locked to a master clock |
D. | none of the mentioned |
Answer» E. | |
79. |
In SONET, each synchronous transfer signal STS-n is composed of |
A. | 2000 frames |
B. | 4000 frames |
C. | 8000 frames |
D. | 16000 frames |
Answer» D. 16000 frames | |
80. |
4. The photonic layer of the SONET is similar to the __________ of OSI model. |
A. | network layer |
B. | data link layer |
C. | physical layer |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
81. |
The path layer of SONET is responsible for the movement of a signal |
A. | from its optical source to its optical destination |
B. | across a physical line |
C. | across a physical section |
D. | none of the mentioned |
Answer» C. across a physical section | |
82. |
In SONET, STS-1 level of electrical signalling has the data rate of |
A. | 51.84 Mbps |
B. | 155.52 Mbps |
C. | 466.56 Mbps |
D. | none of the mentioned |
Answer» B. 155.52 Mbps | |
83. |
SONET stands for |
A. | synchronous optical network |
B. | synchronous operational network |
C. | stream optical network |
D. | shell operational network |
Answer» B. synchronous operational network | |
84. |
Which one of the following frequency is not used in WiMAX for communication? |
A. | 2.3 GHz |
B. | 2.4 GHz |
C. | 2.5 GHz |
D. | 3.5 GHz |
Answer» C. 2.5 GHz | |
85. |
WiMAX is mostly used for |
A. | local area network |
B. | metropolitan area network |
C. | personal area network |
D. | none of the mentioned |
Answer» C. personal area network | |
86. |
Devices that provide the connectivity to a WiMAX network are known as |
A. | subscriber stations |
B. | base stations |
C. | gateway |
D. | none of the mentioned |
Answer» B. base stations | |
87. |
For encryption, WiMAX supports |
A. | advanced encryption standard |
B. | triple data encryption standard |
C. | both advanced encryption standard and triple data encryption standard |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
88. |
WiMAX MAC layer provides an interface between |
A. | higher transport layers and physical layer |
B. | application layer and network layer |
C. | data link layer and network layer |
D. | none of the mentioned |
Answer» B. application layer and network layer | |
89. |
Which one of the following modulation scheme is supported by WiMAX? |
A. | binary phase shift keying modulation |
B. | quadrature phase shift keying modulation |
C. | quadrature amplitude modulation |
D. | all of the mentioned |
Answer» E. | |
90. |
WiMAX uses the |
A. | orthogonal frequency division multiplexing |
B. | time division multiplexing |
C. | space division multiplexing |
D. | all of the mentioned |
Answer» B. time division multiplexing | |
91. |
WiMAX provides |
A. | simplex communication |
B. | half duplex communication |
C. | full duplex communication |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
92. |
WiMAX stands for |
A. | wireless maximum communication |
B. | worldwide interoperability for microwave access |
C. | worldwide international standard for microwave access |
D. | none of the mentioned |
Answer» C. worldwide international standard for microwave access | |
93. |
A scatternet can have maximum |
A. | 10 piconets |
B. | 20 piconets |
C. | 30 piconets |
D. | 40 piconets |
Answer» B. 20 piconets | |
94. |
The bluetooth supports |
A. | point-to-point connections |
B. | point-to-multipoint connection |
C. | both point-to-point connections and point-to-multipoint connection |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
95. |
Bluetooth transceiver devices operate in ______ band. |
A. | 2.4 GHz ISM |
B. | 2.5 GHz ISM |
C. | 2.6 GHz ISM |
D. | 2.7 GHz ISM |
Answer» B. 2.5 GHz ISM | |
96. |
In the piconet of bluetooth one master device |
A. | can not be slave |
B. | can be slave in another piconet |
C. | can be slave in the same piconet |
D. | none of the mentioned |
Answer» C. can be slave in the same piconet | |
97. |
What is A2DP (advanced audio distribution profile)? |
A. | a bluetooth profile for streaming audio |
B. | a bluetooth profile for streaming video |
C. | a bluetooth profile for security |
D. | none of the mentioned |
Answer» B. a bluetooth profile for streaming video | |
98. |
Unauthorised access of information from a wireless device through a bluetooth connection is called |
A. | bluemaking |
B. | bluesnarfing |
C. | bluestring |
D. | none of the mentioned |
Answer» C. bluestring | |
99. |
Bluetooth uses |
A. | frequency hoping spread spectrum |
B. | orthogonal frequency division multiplexing |
C. | time division multiplexing |
D. | none of the mentioned |
Answer» B. orthogonal frequency division multiplexing | |
100. |
Bluetooth is the wireless technology for |
A. | local area network |
B. | personal area network |
C. | both local area network and personal area network |
D. | none of the mentioned |
Answer» C. both local area network and personal area network | |