MCA/Computer Network MCA Question MCQ Set 6 Sample Test,Sample questions

Question:
 If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

1.MAC address

2.IP address

3.Both MAC address and IP address

4. None of the mentioned


Question:
 L2F was developed by which company?

1. Microsoft

2.Cisco

3.Blizzard Entertainment

4. IETF


Question:
 The DHCP server can provide the _______ of the IP addresses.

1.dynamic allocation

2. automatic allocation

3. static allocation

4.all of the mentioned


Question:
 Which component is included in IP security?

1.Authentication Header (AH)

2.Encapsulating Security Payload (ESP)

3. Internet key Exchange (IKE)

4.all of the mentioned


Question:
 Which layer 3 protocols can be transmitted over an L2TP VPN?

1.Only IP

2.Only IPX

3.Only ICMP

4. IP and IPX


Question:
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.

1. VNP

2. VPN

3.VSN

4.VSPN


Question:
After obtaining the IP address, to prevent the IP conflict the client may use ____

1. internet relay chat

2.broader gateway protocol

3. address resolution protocol

4.none of the mentioned


Question:
Among the following, identify which task is not involved in Storage Capacity management?

1. Identifying storage systems are approaching full capacity

2.Monitoring trends for each resource

3. Tracking Total capacity, total used, total available

4.Preventing unauthorized access to the storage


Question:
An attempt to make a computer resource unavailable to its intended users is called ______

1. Denial-of-service attack

2.Virus attack

3.Worms attack

4.Botnet process


Question:
BER stands for ________

1.Basic Encoding Rules

2.Basic Encoding Resolver

3.Basic Encoding Rotator

4.Basic Encoding Router


Question:
Configuration management can be divided into which two subsystems?

1. Reconfiguration and documentation

2.Management and configuration

3.Documentation and dialing up

4.Configuration and dialing up


Question:
Control of the users’ access to network resources through charges is the main responsibility of ________

1.Reactive Fault Management

2.Reconfigured Fault Management

3.Accounting Management

4. Security Management


Question:
DHCP client and servers on the same subnet communicate via _________

1. UDP broadcast

2.UDP unicast

3.TCP broadcast

4. TCP unicast


Question:
Effect of open standards like SMI(s) is _________

1.standardization drives software interoperability and interchange ability

2. breaks the old-style dependence on proprietary methods, trade secrets, and single providers

3.builds a strong foundation on which others can quickly build and innovate

4.all of the mentioned


Question:
Effective Storage management does not include ____

1.security

2.backups

3.reporting

4. connection


Question:
ESP (Encapsulating Security Protocol) is defined in which of the following standards?

1.IPsec

2.PPTP

3.PPP

4.L2TP


Question:
Extensible authentication protocol is authentication framework frequently used in ______

1.Wired personal area network

2.Wireless networks

3.Wired local area network

4.Wired metropolitan area network


Question:
Full duplex mode increases the capacity of each domain by ________

1.10 to 20 mbps

2.20 to 30 mbps

3. 30 to 40 mbps

4.40 to 50 mbps


Question:
How do Storage administrators ensure secure access to storage devices?

1.By using Zoning

2.By putting a physical lock on the storage device

3. By keeping devices shutdown when not in use

4.By keeping devices when used


Question:
Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.

1.Proprietary management interfaces

2.Multiple applications to manage storage in the data center

3.No single view

4. Single view


Question:
In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________

1.Fault Management

2.Secured Management

3.Active Management

4. Security Management


Question:
In tunnel mode, IPSec protects the ______

1.Entire IP packet

2.IP header

3.IP payload

4.IP trailer


Question:
IPSec is designed to provide security at the _______

1. Transport layer

2.Network layer

3.Application layer

4.Session layer


Question:
PGP encrypts data by using a block cipher called ______

1. International data encryption algorithm

2. Private data encryption algorithm

3.Internet data encryption algorithm

4.Local data encryption algorithm


Question:
Pretty good privacy (PGP) is used in ______

1. Browser security

2.Email security

3.FTP security

4.WiFi security


Question:
SMI-S Standard uses which of the following?

1.Java RMI

2.CIM-XML/HTTP

3.CORBA

4..NET


Question:
SNMP is the framework for managing devices in an internet using the ______

1.TCP/IP protocol

2.UDP

3.SMTP

4.None


Question:
Storage management comprises of ________

1.SAN Management

2.Data protection

3.Disk operation

4.all of the mentioned


Question:
Structure of Management Information (SMI), is the guideline of ________

1.HTTP

2.SNMP

3. URL

4. MIB


Question:
Task of Distributed Management Task Force is not ________

1.to promote interoperability among the management solution providers

2. to act as an interface between the various budding technologies and provide solution to manage various environments

3.to track the operation of the different management solution providers

4.to manage the facility by itself if one of the management solution providers fail


Question:
Telnet is used for _______

1.Television on net

2.Network of Telephones

3.Remote Login

4.Teleshopping site


Question:
The application layer protocol used by a Telnet application is ________

1.Telnet

2.FTP

3.HTTP

4.SMTP


Question:
The application-level protocol in which a few manager stations control a set of agents is called ______

1.HTML

2.TCP

3.SNMP

4.SNMP/IP


Question:
The main difference between SNMPv3 and SNMPv2 is _______

1.Management

2.Integration

3. Classification

4.Enhanced security


Question:
To use a Simple Network Management System, we need _______

1.Servers

2.IP

3.Protocols

4. Rules


Question:
Traffic in a VPN is NOT _______

1. Invisible from public networks

2.Logically separated from other traffic

3. Accessible from unauthorized public networks

4.Restricted to a single protocol in IPsec


Question:
VPNs are financially speaking ______

1.Always more expensive than leased lines

2.Always cheaper than leased lines

3.Usually cheaper than leased lines

4.Usually more expensive than leased lines


Question:
What is DHCP snooping?

1.techniques applied to ensure the security of an existing DHCP infrastructure

2. encryption of the DHCP server requests

3. algorithm for DHCP

4.none of the mentioned


Question:
What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?

1.telnet//www.sanfoundry.com

2. telnet:www.sanfoundry.com

3. telnet://www.sanfoundry.com

4.telnet www.sanfoundry.com


Question:
What protocol is NOT used in the operation of a VPN?

1. PPTP

2.IPsec

3.YMUM

4. L2TP


Question:
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________

1.DNS lookup

2. DNS hijacking

3.DNS spoofing

4.DNS authorizing


Question:
When were VPNs introduced into the commercial world?

1.Early 80’s

2.Late 80’s

3.Early 90’s

4.Late 90’s


Question:
Which amongst the following statements is correct for “character at a time” mode?

1.Character processing is done on the local system under the control of the remote system

2.Most text typed is immediately sent to the remote host for processing

3.All text is echoed locally, only completed lines are sent to the remote host

4.All text is processed locally, and only confirmed lines are sent to the remote host


Question:
Which layer of the OSI reference model does IPsec work at?

1. Layer 1

2.Layer 2

3.Layer 3

4.Layer 4


Question:
Which layer of the OSI reference model does PPTP work at?

1.Layer 1

2. Layer 2

3. Layer 3

4. Layer 4


Question:
Which of the following is not a storage device?

1.Switch

2.RAID Arrays

3. Tape drives

4.Hub


Question:
Which of the following statements is NOT true concerning VPNs?

1. Financially rewarding compared to leased lines

2. Allows remote workers to access corporate data

3.Allows LAN-to-LAN connectivity over public networks

4.Is the backbone of the Internet


Question:
Which protocols are used for Storage management?

1.SNMP

2.LDAP

3.POP3

4.MIB


Question:
WPA2 is used for security in _______

1. Ethernet

2.Bluetooth

3.Wi-Fi

4.Email


Question:
_______ allows you to connect and login to a remote computer

1.Telnet

2.FTP

3.HTTP

4.SMTP


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!