MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 301. |
Which of the following is false with respect to UDP? |
| A. | connection-oriented |
| B. | unreliable |
| C. | transport layer protocol |
| D. | low overhead |
| Answer» B. unreliable | |
| 302. |
Return value of the UDP port “Chargen†is _______ |
| A. | string of characters |
| B. | string of integers |
| C. | array of characters with integers |
| D. | array of zero’s and one’s |
| Answer» B. string of integers | |
| 303. |
SYNC flooding attack belongs to a type of security attack known as ___________ |
| A. | sync flooding attack |
| B. | active attack |
| C. | passive attack |
| D. | denial-of-service attack |
| Answer» E. | |
| 304. |
What allows TCP to detect lost segments and in turn recover from that loss? |
| A. | sequence number |
| B. | acknowledgment number |
| C. | checksum |
| D. | both sequence & acknowledgment number |
| Answer» C. checksum | |
| 305. |
Size of TCP segment header ranges between ___________ |
| A. | 16 and 32 bytes |
| B. | 16 and 32 bits |
| C. | 20 and 60 bytes |
| D. | 20 and 60 bits |
| Answer» D. 20 and 60 bits | |
| 306. |
The value of acknowledgement field in a segment defines _______ |
| A. | sequence number of the byte received previously |
| B. | total number of bytes to receive |
| C. | sequence number of the next byte to be received |
| D. | sequence of zeros and ones |
| Answer» D. sequence of zeros and ones | |
| 307. |
TCP groups a number of bytes together into a packet called _______ |
| A. | packet |
| B. | buffer |
| C. | segment |
| D. | stack |
| Answer» D. stack | |
| 308. |
In TCP, sending and receiving data is done as _______ |
| A. | stream of bytes |
| B. | sequence of characters |
| C. | lines of data |
| D. | packets |
| Answer» B. sequence of characters | |
| 309. |
Which of the following is false with respect to TCP? |
| A. | connection-oriented |
| B. | process-to-process |
| C. | transport layer protocol |
| D. | unreliable |
| Answer» E. | |
| 310. |
Communication offered by TCP is ________ |
| A. | full-duplex |
| B. | half-duplex |
| C. | semi-duplex |
| D. | byte by byte |
| Answer» B. half-duplex | |
| 311. |
The decimal code of Interpret as Command (IAC) character is _______ |
| A. | 252 |
| B. | 253 |
| C. | 254 |
| D. | 255 |
| Answer» E. | |
| 312. |
AbsoluteTelnet is a telnet client for _______ Operating system. |
| A. | windows |
| B. | linux |
| C. | mac |
| D. | ubuntu |
| Answer» B. linux | |
| 313. |
All telnet operations are sent as ________ |
| A. | 4 bits |
| B. | 8 bits |
| C. | 16 bits |
| D. | 32 bits |
| Answer» C. 16 bits | |
| 314. |
Which one of the following is not true? |
| A. | telnet defines a network virtual terminal (nvt) standard |
| B. | client programs interact with nvt |
| C. | server translates nvt operations |
| D. | client can transfer files using to remote server using nvt |
| Answer» E. | |
| 315. |
Telnet protocol is used to establish a connection to __________ |
| A. | tcp port number 21 |
| B. | tcp port number 22 |
| C. | tcp port number 23 |
| D. | tcp port number 25 |
| Answer» D. tcp port number 25 | |
| 316. |
If we want that a character be interpreted by the client instead of server _________ |
| A. | interpret as command (iac) escape character has to be used |
| B. | control functions has to be disabled |
| C. | it is not possible |
| D. | cli character has to be used |
| Answer» B. control functions has to be disabled | |
| 317. |
Which one of the following is not correct? |
| A. | telnet is a general purpose client-server program |
| B. | telnet lets user access an application on a remote computer |
| C. | telnet can also be used for file transfer |
| D. | telnet can be used for remote login |
| Answer» D. telnet can be used for remote login | |
| 318. |
Which operating mode of telnet is full duplex? |
| A. | default mode |
| B. | server mode |
| C. | line mode |
| D. | character mode |
| Answer» D. character mode | |
| 319. |
_______ allows you to connect and login to a remote computer |
| A. | telnet |
| B. | ftp |
| C. | http |
| D. | smtp |
| Answer» B. ftp | |
| 320. |
Telnet is used for _______ |
| A. | television on net |
| B. | network of telephones |
| C. | remote login |
| D. | teleshopping site |
| Answer» D. teleshopping site | |
| 321. |
The application layer protocol used by a Telnet application is ________ |
| A. | telnet |
| B. | ftp |
| C. | http |
| D. | smtp |
| Answer» B. ftp | |
| 322. |
Structure of Management Information (SMI), is the guideline of ________ |
| A. | http |
| B. | snmp |
| C. | url |
| D. | mib |
| Answer» C. url | |
| 323. |
SNMP is the framework for managing devices in an internet using the ______ |
| A. | tcp/ip protocol |
| B. | udp |
| C. | smtp |
| D. | none |
| Answer» B. udp | |
| 324. |
BER stands for ________ |
| A. | basic encoding rules |
| B. | basic encoding resolver |
| C. | basic encoding rotator |
| D. | basic encoding router |
| Answer» B. basic encoding resolver | |
| 325. |
The main difference between SNMPv3 and SNMPv2 is _______ |
| A. | management |
| B. | integration |
| C. | classification |
| D. | enhanced security |
| Answer» E. | |
| 326. |
Configuration management can be divided into which two subsystems? |
| A. | reconfiguration and documentation |
| B. | management and configuration |
| C. | documentation and dialing up |
| D. | configuration and dialing up |
| Answer» B. management and configuration | |
| 327. |
To use a Simple Network Management System, we need _______ |
| A. | servers |
| B. | ip |
| C. | protocols |
| D. | rules |
| Answer» E. | |
| 328. |
SMI-S Standard uses which of the following? |
| A. | java rmi |
| B. | cim-xml/http |
| C. | corba |
| D. | .net |
| Answer» C. corba | |
| 329. |
Full duplex mode increases the capacity of each domain by ________ |
| A. | 10 to 20 mbps |
| B. | 20 to 30 mbps |
| C. | 30 to 40 mbps |
| D. | 40 to 50 mbps |
| Answer» B. 20 to 30 mbps | |
| 330. |
Effective Storage management does not include __________ |
| A. | security |
| B. | backups |
| C. | reporting |
| D. | connection |
| Answer» E. | |
| 331. |
How do Storage administrators ensure secure access to storage devices? |
| A. | by using zoning |
| B. | by putting a physical lock on the storage device |
| C. | by keeping devices shutdown when not in use |
| D. | by keeping devices when used |
| Answer» B. by putting a physical lock on the storage device | |
| 332. |
Which protocols are used for Storage management? |
| A. | snmp |
| B. | ldap |
| C. | pop3 |
| D. | mib |
| Answer» B. ldap | |
| 333. |
Which of the following is not a storage device? |
| A. | switch |
| B. | raid arrays |
| C. | tape drives |
| D. | hub |
| Answer» E. | |
| 334. |
Storage management comprises of _______________ |
| A. | san management |
| B. | data protection |
| C. | disk operation |
| D. | all of the mentioned |
| Answer» E. | |
| 335. |
DHCP client and servers on the same subnet communicate via _________ |
| A. | udp broadcast |
| B. | udp unicast |
| C. | tcp broadcast |
| D. | tcp unicast |
| Answer» B. udp unicast | |
| 336. |
IP assigned for a client by DHCP server is |
| A. | for a limited period |
| B. | for an unlimited period |
| C. | not time dependent |
| D. | none of the mentioned |
| Answer» B. for an unlimited period | |
| 337. |
The DHCP server _________ |
| A. | maintains a database of available ip addresses |
| B. | maintains the information about client configuration parameters |
| C. | grants a ip address when receives a request from a client |
| D. | all of the mentioned |
| Answer» E. | |
| 338. |
DHCP is used for ________ |
| A. | ipv6 |
| B. | ipv4 |
| C. | both ipv6 and ipv4 |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 339. |
DHCP (dynamic host configuration protocol) provides __________ to the client. |
| A. | ip address |
| B. | mac address |
| C. | url |
| D. | none of the mentioned |
| Answer» B. mac address | |
| 340. |
Which one of the following authentication method is used by SSH? |
| A. | public-key |
| B. | host based |
| C. | password |
| D. | all of the mentioned |
| Answer» E. | |
| 341. |
SCP protocol is evolved from __________ over SSH. |
| A. | rcp protocol |
| B. | dhcp protocol |
| C. | mgcp protocol |
| D. | gcp protocol |
| Answer» B. dhcp protocol | |
| 342. |
Which one of the following feature was present in SSH protocol, version 1? |
| A. | password changing |
| B. | periodic replacement of session keys |
| C. | support for public-key certificates |
| D. | none of the mentioned |
| Answer» E. | |
| 343. |
Which one of the following is a file transfer protocol using SSH? |
| A. | scp |
| B. | sftp |
| C. | rsync |
| D. | all of the mentioned |
| Answer» E. | |
| 344. |
SSH-2 does not contain ______________ |
| A. | transport layer |
| B. | user authentication layer |
| C. | physical layer |
| D. | connection layer |
| Answer» D. connection layer | |
| 345. |
SSH can be used in only _____________ |
| A. | unix-like operating systems |
| B. | windows |
| C. | both unix-like and windows systems |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 346. |
Secure shell (SSH) network protocol is used for __________ |
| A. | secure data communication |
| B. | remote command-line login |
| C. | remote command execution |
| D. | all of the mentioned |
| Answer» E. | |
| 347. |
SSH uses ___________ to authenticate the remote computer. |
| A. | public-key cryptography |
| B. | private-key cryptography |
| C. | any of public-key or private-key |
| D. | both public-key & private-key |
| Answer» B. private-key cryptography | |
| 348. |
The domain name system is maintained by _______ |
| A. | distributed database system |
| B. | a single server |
| C. | a single computer |
| D. | none of the mentioned |
| Answer» B. a single server | |
| 349. |
Wildcard domain names start with label _______ |
| A. | @ |
| B. | * |
| C. | & |
| D. | # |
| Answer» C. & | |
| 350. |
If a server has no clue about where to find the address for a hostname then _______ |
| A. | server asks to the root server |
| B. | server asks to its adjcent server |
| C. | request is not processed |
| D. | none of the mentioned |
| Answer» B. server asks to its adjcent server | |