

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
401. |
IP Security operates in which layer of the OSI model? |
A. | Network |
B. | Transport |
C. | Application |
D. | Physical |
Answer» B. Transport | |
402. |
IPsec defines two protocols: _______ and ________ |
A. | AH; SSL |
B. | PGP; ESP |
C. | AH; ESP |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
403. |
______ provides authentication at the IP level. |
A. | AH |
B. | ESP |
C. | PGP |
D. | SSL |
Answer» B. ESP | |
404. |
Which two types of IPsec can be used to secure communications between two LANs? |
A. | AH tunnel mode |
B. | ESP tunnel mode |
C. | Both AH tunnel mode and ESP tunnel mode |
D. | ESP transport mode |
Answer» D. ESP transport mode | |
405. |
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? |
A. | Kerberos V5 |
B. | SHA |
C. | MD5 |
D. | Both SHA and MD5 |
Answer» E. | |
406. |
Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN? |
A. | AH transport mode |
B. | ESP transport mode |
C. | ESP tunnel mode |
D. | AH tunnel mode |
Answer» C. ESP tunnel mode | |
407. |
Correct expression for UDP user datagram length is |
A. | UDP length = IP length – IP header’s length |
B. | UDP length = UDP length – UDP header’s length |
C. | UDP length = IP length + IP header’s length |
D. | UDP length = UDP length + UDP header’s length |
Answer» B. UDP length = UDP length – UDP header’s length | |
408. |
“Total length” field in UDP packet header is the length of |
A. | Only UDP header |
B. | Only data |
C. | Only checksum |
D. | UDP header plus data |
Answer» E. | |
409. |
The port number is “ephemeral port number”, if the source host is …… |
A. | NTP |
B. | Echo |
C. | Server |
D. | Client |
Answer» E. | |
410. |
what is the header size of UDP packet? |
A. | 8 bytes |
B. | 8 bits |
C. | 16 bytes |
D. | 124 bytes |
Answer» B. 8 bits | |
411. |
Port number used by Network Time Protocol(NTP) with UDP is |
A. | 161 |
B. | 123 |
C. | 162 |
D. | 124 |
Answer» C. 162 | |
412. |
The main advantage of UDP is |
A. | More overload |
B. | Reliable |
C. | Less overload |
D. | Fast |
Answer» D. Fast | |
413. |
Beyond IP, TCP provides additional services such as |
A. | Routing and switching |
B. | Sending and receiving of packets |
C. | Multiplexing and demultiplexing |
D. | Demultiplexing and error checking |
Answer» E. | |
414. |
Return value of the UDP port “Chargen” is |
A. | String of characters |
B. | String of integers |
C. | Array of characters with integers |
D. | Array of zero’s and one’s |
Answer» B. String of integers | |
415. |
Which of the following is false with respect to UDP |
A. | Connection-oriented |
B. | Unreliable |
C. | Transport layer protocol |
D. | All of the mentioned |
Answer» B. Unreliable | |
416. |
Size of source and destination port address of TCP header respectively are |
A. | 16-bits and 32-bits |
B. | 16-bits and 16-bits |
C. | 32-bits and 16-bits |
D. | 32-bits and 32-bits |
Answer» C. 32-bits and 16-bits | |
417. |
SYNC flooding attack belongs to a type of security attack known as |
A. | SYNC flooding attack |
B. | Active attack |
C. | Passive attack |
D. | Denial-of-service attack |
Answer» E. | |
418. |
The situation when a malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagrams |
A. | SYNC flooding attack |
B. | Active attack |
C. | Passive attack |
D. | Denial-of-service attack |
Answer» B. Active attack | |
419. |
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is |
A. | Mutual open |
B. | Mutual Close |
C. | Simultaneous open |
D. | Simultaneous close |
Answer» D. Simultaneous close | |
420. |
The process of, A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server is |
A. | Active open |
B. | Active close |
C. | Passive close |
D. | Passive open |
Answer» B. Active close | |
421. |
The server program tells its TCP that it is ready to accept a connection. This process is called |
A. | Active open |
B. | Active close |
C. | Passive close |
D. | Passive open |
Answer» E. | |
422. |
Connection establishment in TCP is done by which mechanism? |
A. | Flow control |
B. | Three-Way Handshaking |
C. | Forwarding |
D. | Synchronisation |
Answer» C. Forwarding | |
423. |
Size of TCP segment header ranges between |
A. | 16 and 32 bytes |
B. | 16 and 32 bits |
C. | 20 and 60 bytes |
D. | 20 and 60 bits |
Answer» D. 20 and 60 bits | |
424. |
The receiver of the data controls the amount of data that are to be sent by the sender is referred as |
A. | Flow control |
B. | Error control |
C. | Congestion control |
D. | Error detection |
Answer» B. Error control | |
425. |
The value of acknowledgement field in a segment defines |
A. | Number of previous bytes to receive |
B. | Total number of bytes to receive |
C. | Number of next bytes to receive |
D. | Sequence of zero’s and one’s |
Answer» D. Sequence of zero’s and one’s | |
426. |
Bytes of data being transferred in each connection are numbered by TCP. These numbers starts with a |
A. | Random number |
B. | Zero |
C. | One |
D. | Sequence of zero’s and one’s |
Answer» E. | |
427. |
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment. |
A. | 10000 |
B. | 10001 |
C. | 12001 |
D. | 11001 |
Answer» C. 12001 | |
428. |
In segment header, sequence number and acknowledgement number field refers to |
A. | Byte number |
B. | Buffer number |
C. | Segment number |
D. | Acknowledgment |
Answer» B. Buffer number | |
429. |
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. |
A. | Packet |
B. | Buffer |
C. | Segment |
D. | Acknowledgment |
Answer» E. | |
430. |
Communication offered by TCP is |
A. | Full-duplex |
B. | Half-duplex |
C. | Semi-duplex |
D. | Byte by byte |
Answer» B. Half-duplex | |
431. |
TCP groups a number of bytes together into a packet called |
A. | Packet |
B. | Buffer |
C. | Segment |
D. | Stack |
Answer» D. Stack | |
432. |
TCP process may not write and read data at the same speed. So we need __________ for storage. |
A. | Packets |
B. | Buffers |
C. | Segments |
D. | Stacks |
Answer» C. Segments | |
433. |
In TCP, sending and receiving data is done as |
A. | Stream of bytes |
B. | Sequence of characters |
C. | Lines of data |
D. | Packets |
Answer» B. Sequence of characters | |
434. |
Which of the following is true with respect to TCP |
A. | Connection-oriented |
B. | Process-to-process |
C. | Transport layer protocol |
D. | All of the mentioned |
Answer» E. | |
435. |
In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in |
A. | default mode |
B. | character mode |
C. | server mode |
D. | none of the mentioned |
Answer» B. character mode | |
436. |
In character mode operation of telnet implementation |
A. | each character typed is sent by the client to the server |
B. | each character typed is discarded by the server |
C. | each character typed is aggregated into a word and then send to the server |
D. | none of the mentioned |
Answer» B. each character typed is discarded by the server | |
437. |
The decimal code of interpret as command (IAC) character is |
A. | 252 |
B. | 253 |
C. | 254 |
D. | 255 |
Answer» E. | |
438. |
AbsoluteTelnet is a telnet client for |
A. | windows |
B. | linux |
C. | mac |
D. | none of the mentioned |
Answer» B. linux | |
439. |
All telnet operations are sent as |
A. | 4 bytes |
B. | 8 bytes |
C. | 16 bytes |
D. | 32 bytes |
Answer» C. 16 bytes | |
440. |
Telnet protocol is used to establish a connection to |
A. | TCP port number 21 |
B. | TCP port number 22 |
C. | TCP port number 23 |
D. | TCP port number 24 |
Answer» D. TCP port number 24 | |
441. |
If we want that a character be interpreted by the client instead of server |
A. | escape character has to be used |
B. | control functions has to be disabled |
C. | it is not possible |
D. | none of the mentioned |
Answer» B. control functions has to be disabled | |
442. |
Which operating mode of telnet is full duplex? |
A. | default mode |
B. | server mode |
C. | line mode |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
443. |
Telnet is a |
A. | Television on net |
B. | Network of Telephones |
C. | Remote Login |
D. | Teleshopping site |
Answer» D. Teleshopping site | |
444. |
_______ allows you to connect and login to a remote computer |
A. | Telnet |
B. | FTP |
C. | HTTP |
D. | None of the mentioned |
Answer» B. FTP | |
445. |
In “character at a time” mode |
A. | Character processing is done on the local system under the control of the remote system |
B. | Most text typed is immediately sent to the remote host for processing |
C. | All text is echoed locally, only completed lines are sent to the remote host |
D. | None of the mentioned |
Answer» C. All text is echoed locally, only completed lines are sent to the remote host | |
446. |
The protocol used by Telnet application is |
A. | Telnet |
B. | FTP |
C. | HTTP |
D. | None of the mentioned |
Answer» B. FTP | |
447. |
Structure of Management Information (SMI), is guideline of |
A. | HTTP |
B. | SNMP |
C. | URL |
D. | MIB |
Answer» C. URL | |
448. |
SNMP is a framework for managing devices in an internet using the |
A. | TCP/IP protocol |
B. | UDP |
C. | SMTP |
D. | None |
Answer» B. UDP | |
449. |
Control of users’ access to network resources through charges are main responsibilities of |
A. | Reactive Fault Management |
B. | Reconfigured Fault Management |
C. | Accounting Management |
D. | Security Management |
Answer» D. Security Management | |
450. |
BER stands for |
A. | Basic Encoding Rules |
B. | Basic Encoding Resolver |
C. | Basic Encoding Rotator |
D. | Basic Encoding Router |
Answer» B. Basic Encoding Resolver | |