

MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
301. |
Which of the following is false with respect to UDP? |
A. | connection-oriented |
B. | unreliable |
C. | transport layer protocol |
D. | low overhead |
Answer» B. unreliable | |
302. |
Return value of the UDP port “Chargen†is _______ |
A. | string of characters |
B. | string of integers |
C. | array of characters with integers |
D. | array of zero’s and one’s |
Answer» B. string of integers | |
303. |
SYNC flooding attack belongs to a type of security attack known as ___________ |
A. | sync flooding attack |
B. | active attack |
C. | passive attack |
D. | denial-of-service attack |
Answer» E. | |
304. |
What allows TCP to detect lost segments and in turn recover from that loss? |
A. | sequence number |
B. | acknowledgment number |
C. | checksum |
D. | both sequence & acknowledgment number |
Answer» C. checksum | |
305. |
Size of TCP segment header ranges between ___________ |
A. | 16 and 32 bytes |
B. | 16 and 32 bits |
C. | 20 and 60 bytes |
D. | 20 and 60 bits |
Answer» D. 20 and 60 bits | |
306. |
The value of acknowledgement field in a segment defines _______ |
A. | sequence number of the byte received previously |
B. | total number of bytes to receive |
C. | sequence number of the next byte to be received |
D. | sequence of zeros and ones |
Answer» D. sequence of zeros and ones | |
307. |
TCP groups a number of bytes together into a packet called _______ |
A. | packet |
B. | buffer |
C. | segment |
D. | stack |
Answer» D. stack | |
308. |
In TCP, sending and receiving data is done as _______ |
A. | stream of bytes |
B. | sequence of characters |
C. | lines of data |
D. | packets |
Answer» B. sequence of characters | |
309. |
Which of the following is false with respect to TCP? |
A. | connection-oriented |
B. | process-to-process |
C. | transport layer protocol |
D. | unreliable |
Answer» E. | |
310. |
Communication offered by TCP is ________ |
A. | full-duplex |
B. | half-duplex |
C. | semi-duplex |
D. | byte by byte |
Answer» B. half-duplex | |
311. |
The decimal code of Interpret as Command (IAC) character is _______ |
A. | 252 |
B. | 253 |
C. | 254 |
D. | 255 |
Answer» E. | |
312. |
AbsoluteTelnet is a telnet client for _______ Operating system. |
A. | windows |
B. | linux |
C. | mac |
D. | ubuntu |
Answer» B. linux | |
313. |
All telnet operations are sent as ________ |
A. | 4 bits |
B. | 8 bits |
C. | 16 bits |
D. | 32 bits |
Answer» C. 16 bits | |
314. |
Which one of the following is not true? |
A. | telnet defines a network virtual terminal (nvt) standard |
B. | client programs interact with nvt |
C. | server translates nvt operations |
D. | client can transfer files using to remote server using nvt |
Answer» E. | |
315. |
Telnet protocol is used to establish a connection to __________ |
A. | tcp port number 21 |
B. | tcp port number 22 |
C. | tcp port number 23 |
D. | tcp port number 25 |
Answer» D. tcp port number 25 | |
316. |
If we want that a character be interpreted by the client instead of server _________ |
A. | interpret as command (iac) escape character has to be used |
B. | control functions has to be disabled |
C. | it is not possible |
D. | cli character has to be used |
Answer» B. control functions has to be disabled | |
317. |
Which one of the following is not correct? |
A. | telnet is a general purpose client-server program |
B. | telnet lets user access an application on a remote computer |
C. | telnet can also be used for file transfer |
D. | telnet can be used for remote login |
Answer» D. telnet can be used for remote login | |
318. |
Which operating mode of telnet is full duplex? |
A. | default mode |
B. | server mode |
C. | line mode |
D. | character mode |
Answer» D. character mode | |
319. |
_______ allows you to connect and login to a remote computer |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» B. ftp | |
320. |
Telnet is used for _______ |
A. | television on net |
B. | network of telephones |
C. | remote login |
D. | teleshopping site |
Answer» D. teleshopping site | |
321. |
The application layer protocol used by a Telnet application is ________ |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» B. ftp | |
322. |
Structure of Management Information (SMI), is the guideline of ________ |
A. | http |
B. | snmp |
C. | url |
D. | mib |
Answer» C. url | |
323. |
SNMP is the framework for managing devices in an internet using the ______ |
A. | tcp/ip protocol |
B. | udp |
C. | smtp |
D. | none |
Answer» B. udp | |
324. |
BER stands for ________ |
A. | basic encoding rules |
B. | basic encoding resolver |
C. | basic encoding rotator |
D. | basic encoding router |
Answer» B. basic encoding resolver | |
325. |
The main difference between SNMPv3 and SNMPv2 is _______ |
A. | management |
B. | integration |
C. | classification |
D. | enhanced security |
Answer» E. | |
326. |
Configuration management can be divided into which two subsystems? |
A. | reconfiguration and documentation |
B. | management and configuration |
C. | documentation and dialing up |
D. | configuration and dialing up |
Answer» B. management and configuration | |
327. |
To use a Simple Network Management System, we need _______ |
A. | servers |
B. | ip |
C. | protocols |
D. | rules |
Answer» E. | |
328. |
SMI-S Standard uses which of the following? |
A. | java rmi |
B. | cim-xml/http |
C. | corba |
D. | .net |
Answer» C. corba | |
329. |
Full duplex mode increases the capacity of each domain by ________ |
A. | 10 to 20 mbps |
B. | 20 to 30 mbps |
C. | 30 to 40 mbps |
D. | 40 to 50 mbps |
Answer» B. 20 to 30 mbps | |
330. |
Effective Storage management does not include __________ |
A. | security |
B. | backups |
C. | reporting |
D. | connection |
Answer» E. | |
331. |
How do Storage administrators ensure secure access to storage devices? |
A. | by using zoning |
B. | by putting a physical lock on the storage device |
C. | by keeping devices shutdown when not in use |
D. | by keeping devices when used |
Answer» B. by putting a physical lock on the storage device | |
332. |
Which protocols are used for Storage management? |
A. | snmp |
B. | ldap |
C. | pop3 |
D. | mib |
Answer» B. ldap | |
333. |
Which of the following is not a storage device? |
A. | switch |
B. | raid arrays |
C. | tape drives |
D. | hub |
Answer» E. | |
334. |
Storage management comprises of _______________ |
A. | san management |
B. | data protection |
C. | disk operation |
D. | all of the mentioned |
Answer» E. | |
335. |
DHCP client and servers on the same subnet communicate via _________ |
A. | udp broadcast |
B. | udp unicast |
C. | tcp broadcast |
D. | tcp unicast |
Answer» B. udp unicast | |
336. |
IP assigned for a client by DHCP server is |
A. | for a limited period |
B. | for an unlimited period |
C. | not time dependent |
D. | none of the mentioned |
Answer» B. for an unlimited period | |
337. |
The DHCP server _________ |
A. | maintains a database of available ip addresses |
B. | maintains the information about client configuration parameters |
C. | grants a ip address when receives a request from a client |
D. | all of the mentioned |
Answer» E. | |
338. |
DHCP is used for ________ |
A. | ipv6 |
B. | ipv4 |
C. | both ipv6 and ipv4 |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
339. |
DHCP (dynamic host configuration protocol) provides __________ to the client. |
A. | ip address |
B. | mac address |
C. | url |
D. | none of the mentioned |
Answer» B. mac address | |
340. |
Which one of the following authentication method is used by SSH? |
A. | public-key |
B. | host based |
C. | password |
D. | all of the mentioned |
Answer» E. | |
341. |
SCP protocol is evolved from __________ over SSH. |
A. | rcp protocol |
B. | dhcp protocol |
C. | mgcp protocol |
D. | gcp protocol |
Answer» B. dhcp protocol | |
342. |
Which one of the following feature was present in SSH protocol, version 1? |
A. | password changing |
B. | periodic replacement of session keys |
C. | support for public-key certificates |
D. | none of the mentioned |
Answer» E. | |
343. |
Which one of the following is a file transfer protocol using SSH? |
A. | scp |
B. | sftp |
C. | rsync |
D. | all of the mentioned |
Answer» E. | |
344. |
SSH-2 does not contain ______________ |
A. | transport layer |
B. | user authentication layer |
C. | physical layer |
D. | connection layer |
Answer» D. connection layer | |
345. |
SSH can be used in only _____________ |
A. | unix-like operating systems |
B. | windows |
C. | both unix-like and windows systems |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
346. |
Secure shell (SSH) network protocol is used for __________ |
A. | secure data communication |
B. | remote command-line login |
C. | remote command execution |
D. | all of the mentioned |
Answer» E. | |
347. |
SSH uses ___________ to authenticate the remote computer. |
A. | public-key cryptography |
B. | private-key cryptography |
C. | any of public-key or private-key |
D. | both public-key & private-key |
Answer» B. private-key cryptography | |
348. |
The domain name system is maintained by _______ |
A. | distributed database system |
B. | a single server |
C. | a single computer |
D. | none of the mentioned |
Answer» B. a single server | |
349. |
Wildcard domain names start with label _______ |
A. | @ |
B. | * |
C. | & |
D. | # |
Answer» C. & | |
350. |
If a server has no clue about where to find the address for a hostname then _______ |
A. | server asks to the root server |
B. | server asks to its adjcent server |
C. | request is not processed |
D. | none of the mentioned |
Answer» B. server asks to its adjcent server | |