Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

51.

What is the purpose of a shadow honeypot?

A. To flag attacks against known vulnerabilities
B. To help reduce false positives in a signature-based IDS
C. To randomly check suspicious traffic identified by an anomaly detection system
D. To enhance the accuracy of a traditional honeypot
Answer» D. To enhance the accuracy of a traditional honeypot
52.

One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?

A. Inside the firewall
B. Outside the firewall
C. Both inside and outside the firewall
D. Neither inside the firewall nor outside the firewall.
Answer» B. Outside the firewall
53.

A false positive can be defined as…

A. An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
B. An alert that indicates nefarious activity on a system that is not running on the network
C. The lack of an alert for nefarious activity
D. Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network
Answer» E.
54.

Which of the following is an advantage of anomaly detection?

A. Rules are easy to define
B. Custom protocols can be easily analyzed
C. The engine can scale as the rule set grows
D. Malicious activity that falls within normal usage patterns is detected
Answer» D. Malicious activity that falls within normal usage patterns is detected
55.

The local operating system on the server machine passes the incoming packets to the

A. server stub
B. client stub
C. client operating system
D. none of the mentioned
Answer» B. client stub
56.

RPC is a

A. synchronous operation
B. asynchronous operation
C. time independent operation
D. none of the mentioned
Answer» B. asynchronous operation
57.

RPC is used to

A. establish a server on remote machine that can respond to queries
B. retrieve information by calling a query
C. both establish a server on remote machine that can respond to queries and retrieve information by calling a query
D. none of the mentioned
Answer» D. none of the mentioned
58.

An RPC application requires

A. specific protocol for client server communication
B. a client program
C. a server program
D. all of the mentioned
Answer» E.
59.

A remote procedure is uniquely identified by

A. program number
B. version number
C. procedure number
D. all of the mentioned
Answer» E.
60.

RPC works between two processes. These processes must be

A. on the same computer
B. on different computers connected with a network
C. both on the same computer and on different computers connected with a network
D. none of the mentioned
Answer» D. none of the mentioned
61.

RPC allows a computer program to cause a subroutine to execute in

A. its own address space
B. another address space
C. both its own address space and another address space
D. none of the mentioned
Answer» C. both its own address space and another address space
62.

Remote procedure calls is

A. inter-process communication
B. a single process
C. a single thread
D. none of the mentioned
Answer» B. a single process
63.

In RPC, while a server is processing the call, the client is blocked

A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. none of the mentioned
Answer» B. unless the call processing is complete
64.

An RPC (remote procedure call) is initiated by the

A. server
B. client
C. both server and client
D. none of the mentioned
Answer» C. both server and client
65.

Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?

A. SRTP
B. RTCP
C. RCP
D. None of the mentioned
Answer» B. RTCP
66.

An RTP header has a minimum size of

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» B. 16 bytes
67.

Which one of the following multimedia formats can not be supported by RTP?

A. MPEG-4
B. MJPEG
C. MPEG
D. None of the mentioned
Answer» E.
68.

RTP can use

A. unprevileleged UDP ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» E.
69.

An RTP session is established for

A. each media stream
B. all media streams
C. some predefined number of media streams
D. none of the mentioned
Answer» B. all media streams
70.

Which protocol provides the synchronization between media streams?

A. RTP
B. RTCP
C. RPC
D. None of the mentioned
Answer» C. RPC
71.

RTP provides the facility of jitter ____________

A. media stream
B. expansion
C. both media stream and expansion
D. none of the mentioned
Answer» B. expansion
72.

RTP is used to

A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. none of the mentioned
Answer» B. monitor transmission statistics of streams
73.

Real-time transport protocol (RTP) is mostly used in

A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» E.
74.

What is SDH?

A. sdh is similar standard to SONET developed by ITU-T
B. synchronous digital hierarchy
C. both sdh is similar standard to SONET developed by ITU-T and synchronous digital hierarchy
D. none of the mentioned
Answer» D. none of the mentioned
75.

A unidirectional path switching ring is a network with

A. one ring
B. two rings
C. three rings
D. four rings
Answer» C. three rings
76.

Automatic protection switching in linear network is defined at the

A. line layer
B. section layer
C. photonic layer
D. path layer
Answer» B. section layer
77.

A linear SONET network can be

A. point-to-point
B. multi-point
C. both point-to-point and multi-point
D. none of the mentioned
Answer» D. none of the mentioned
78.

Which one of the following is not true about SONET?

A. frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
B. multiplexing is synchronous TDM
C. all clocks in the network are locked to a master clock
D. none of the mentioned
Answer» E.
79.

In SONET, each synchronous transfer signal STS-n is composed of

A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Answer» D. 16000 frames
80.

4. The photonic layer of the SONET is similar to the __________ of OSI model.

A. network layer
B. data link layer
C. physical layer
D. none of the mentioned
Answer» D. none of the mentioned
81.

The path layer of SONET is responsible for the movement of a signal

A. from its optical source to its optical destination
B. across a physical line
C. across a physical section
D. none of the mentioned
Answer» C. across a physical section
82.

In SONET, STS-1 level of electrical signalling has the data rate of

A. 51.84 Mbps
B. 155.52 Mbps
C. 466.56 Mbps
D. none of the mentioned
Answer» B. 155.52 Mbps
83.

SONET stands for

A. synchronous optical network
B. synchronous operational network
C. stream optical network
D. shell operational network
Answer» B. synchronous operational network
84.

Which one of the following frequency is not used in WiMAX for communication?

A. 2.3 GHz
B. 2.4 GHz
C. 2.5 GHz
D. 3.5 GHz
Answer» C. 2.5 GHz
85.

WiMAX is mostly used for

A. local area network
B. metropolitan area network
C. personal area network
D. none of the mentioned
Answer» C. personal area network
86.

Devices that provide the connectivity to a WiMAX network are known as

A. subscriber stations
B. base stations
C. gateway
D. none of the mentioned
Answer» B. base stations
87.

For encryption, WiMAX supports

A. advanced encryption standard
B. triple data encryption standard
C. both advanced encryption standard and triple data encryption standard
D. none of the mentioned
Answer» D. none of the mentioned
88.

WiMAX MAC layer provides an interface between

A. higher transport layers and physical layer
B. application layer and network layer
C. data link layer and network layer
D. none of the mentioned
Answer» B. application layer and network layer
89.

Which one of the following modulation scheme is supported by WiMAX?

A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» E.
90.

WiMAX uses the

A. orthogonal frequency division multiplexing
B. time division multiplexing
C. space division multiplexing
D. all of the mentioned
Answer» B. time division multiplexing
91.

WiMAX provides

A. simplex communication
B. half duplex communication
C. full duplex communication
D. none of the mentioned
Answer» D. none of the mentioned
92.

WiMAX stands for

A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard for microwave access
D. none of the mentioned
Answer» C. worldwide international standard for microwave access
93.

A scatternet can have maximum

A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Answer» B. 20 piconets
94.

The bluetooth supports

A. point-to-point connections
B. point-to-multipoint connection
C. both point-to-point connections and point-to-multipoint connection
D. none of the mentioned
Answer» D. none of the mentioned
95.

Bluetooth transceiver devices operate in ______ band.

A. 2.4 GHz ISM
B. 2.5 GHz ISM
C. 2.6 GHz ISM
D. 2.7 GHz ISM
Answer» B. 2.5 GHz ISM
96.

In the piconet of bluetooth one master device

A. can not be slave
B. can be slave in another piconet
C. can be slave in the same piconet
D. none of the mentioned
Answer» C. can be slave in the same piconet
97.

What is A2DP (advanced audio distribution profile)?

A. a bluetooth profile for streaming audio
B. a bluetooth profile for streaming video
C. a bluetooth profile for security
D. none of the mentioned
Answer» B. a bluetooth profile for streaming video
98.

Unauthorised access of information from a wireless device through a bluetooth connection is called

A. bluemaking
B. bluesnarfing
C. bluestring
D. none of the mentioned
Answer» C. bluestring
99.

Bluetooth uses

A. frequency hoping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. none of the mentioned
Answer» B. orthogonal frequency division multiplexing
100.

Bluetooth is the wireless technology for

A. local area network
B. personal area network
C. both local area network and personal area network
D. none of the mentioned
Answer» C. both local area network and personal area network