MCA/Computer Network MCA Question MCQ Set 7 Sample Test,Sample questions

Question:
 In segment header, sequence number and acknowledgement number fields refer to _______

1.Byte number

2.Buffer number

3. Segment number

4.Acknowledgment


Question:
 IP Security operates in which layer of the OSI model?

1.Network

2. Transport

3.Application

4. Physical


Question:
 The decimal code of Interpret as Command (IAC) character is _______

1.252

2.253

3.254

4.255


Question:
 The receiver of the data controls the amount of data that are to be sent by the sender is referred to as _________

1. Flow control

2.Error control

3.Congestion control

4.Error detection


Question:
 ______ provides authentication at the IP level.

1.AH

2.ESP

3.PGP

4.SSL


Question:
. IPsec defines two protocols: _______ and ________

1.AH; SSL

2.PGP; ESP

3. AH; ESP

4.PGP; SSL


Question:
A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ______

1. Active open

2.Active close

3.Passive close

4. Passive open


Question:
A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?

1. SYNC flooding attack

2. Active attack

3.Passive attack

4.Denial-of-service attack


Question:
AbsoluteTelnet is a telnet client for _______ Operating system.

1.windows

2. linux

3.mac

4.ubuntu


Question:
“Total length” field in UDP packet header is the length of _________

1.Only UDP header

2.Only data

3.Only checksum

4. UDP header plus data


Question:
Beyond IP, UDP provides additional services such as _______

1.Routing and switching

2. Sending and receiving of packets

3.Multiplexing and demultiplexing

4.Demultiplexing and error checking


Question:
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________

1.Fixed number

2.Random sequence of 0’s and 1’s

3.One

4.Sequence of zero’s and one’s


Question:
Communication offered by TCP is ________

1.Full-duplex

2.Half-duplex

3.Semi-duplex

4.Byte by byte


Question:
Connection establishment in TCP is done by which mechanism?

1.Flow control

2.Three-Way Handshaking

3.Forwarding

4.Synchronization


Question:
ESP does not provide ________

1. source authentication

2. data integrity

3. privacy

4.error control


Question:
If we want that a character be interpreted by the client instead of server ______

1. interpret as command (IAC) escape character has to be used

2.control functions has to be disabled

3. it is not possible

4.cli character has to be used


Question:
In computer security _______ means that computer system assets can be modified only by authorized parities.

1.confidentiality

2. integrity

3. availability

4.authenticity


Question:
In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.

1.confidentiality

2.integrity

3.availability

4.authenticity


Question:
In TCP, sending and receiving data is done as _______

1.Stream of bytes

2.Sequence of characters

3. Lines of data

4.Packets


Question:
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ________

1.Mutual open

2.Mutual Close

3.Simultaneous open

4. Simultaneous close


Question:
In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?

1.default mode

2.character mode

3. server mode

4.command mode


Question:
Port number used by Network Time Protocol (NTP) with UDP is ____

1.161

2.123

3.162

4.124


Question:
Return value of the UDP port “Chargen” is _______

1. String of characters

2.String of integers

3.Array of characters with integers

4.Array of zero’s and one’s


Question:
Size of TCP segment header ranges between ______

1.16 and 32 bytes

2.16 and 32 bits

3.20 and 60 bytes

4.20 and 60 bits


Question:
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?

1.10000

2.10001

3. 12001

4. 11001


Question:
SYNC flooding attack belongs to a type of security attack known as _____

1.SYNC flooding attack

2.Active attack

3.Passive attack

4. Denial-of-service attack


Question:
TCP groups a number of bytes together into a packet called _______

1. Packet

2. Buffer

3.Segment

4.Stack


Question:
TCP process may not write and read data at the same speed. So we need __________ for storage.

1.Packets

2.Buffers

3.Segments

4. Stacks


Question:
Telnet protocol is used to establish a connection to ______

1.TCP port number 21

2.TCP port number 22

3.TCP port number 23

4.TCP port number 25


Question:
The port number is “ephemeral port number”, if the source host is _______

1.NTP

2.Echo

3.Server

4. Client


Question:
The server program tells its TCP that it is ready to accept a connection. This process is called _____

1.Active open

2. Active close

3.Passive close

4.Passive open


Question:
The sizes of source and destination port address in TCP header are ___________ respectively.

1. 16-bits and 32-bits

2.16-bits and 16-bits

3.32-bits and 16-bits

4. 32-bits and 32-bits


Question:
The value of acknowledgement field in a segment defines _______

1.sequence number of the byte received previously

2.total number of bytes to receive

3. sequence number of the next byte to be received

4. sequence of zeros and ones


Question:
The ______ field is used to detect errors over the entire user datagram.

1.udp header

2.checksum

3.source port

4.destination port


Question:
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.

1.Packet

2.Buffer

3.Segment

4. Acknowledgment


Question:
What allows TCP to detect lost segments and in turn recover from that loss?

1. Sequence number

2.Acknowledgment number

3.Checksum

4.Both Sequence & Acknowledgment number


Question:
What is the header size of a UDP packet?

1. 8 bytes

2.8 bits

3.16 bytes

4.124 bytes


Question:
What is the main advantage of UDP?

1.More overload

2.Reliable

3.Low overhead

4.Fast


Question:
Which is the correct expression for the length of UDP datagram?

1.UDP length = IP length – IP header’s length

2.UDP length = UDP length – UDP header’s length

3.UDP length = IP length + IP header’s length

4.UDP length = UDP length + UDP header’s length


Question:
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?

1.AH transport mode

2.ESP transport mode

3.ESP tunnel mode

4. AH tunnel mode


Question:
Which of the following is false with respect to TCP?

1.Connection-oriented

2.Process-to-process

3.Transport layer protocol

4.Unreliable


Question:
Which of the following is false with respect to UDP?

1.Connection-oriented

2.Unreliable

3.Transport layer protocol

4.Low overhead


Question:
Which of the following is true for character mode operation of telnet implementation?

1.each character typed is sent by the client to the server

2. each character typed is discarded by the server

3.each character typed is aggregated into a word and then sent to the server

4.each character type is aggregated into a line and then sent to the server


Question:
Which of the following organizations is primarily concerned with military encryption systems?

1.NSA

2. NIST

3. IEEE

4.ITU


Question:
Which one of the following is not correct?

1. telnet is a general purpose client-server program

2.telnet lets user access an application on a remote computer

3. telnet can also be used for file transfer

4.telnet can be used for remote login


Question:
Which one of the following is not correct?

1. telnet is a general purpose client-server program

2.telnet lets user access an application on a remote computer

3.telnet can also be used for file transfer

4.telnet can be used for remote login


Question:
Which one of the following is not true?

1. telnet defines a network virtual terminal (NVT) standard

2.client programs interact with NVT

3.server translates NVT operations

4.client can transfer files using to remote server using NVT


Question:
Which operating mode of telnet is full duplex?

1. default mode

2.server mode

3.line mode

4.character mode


Question:
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

1.Kerberos V5

2. SHA

3.MD5

4.Both SHA and MD5


Question:
Which two types of IPsec can be used to secure communications between two LANs?

1.AH tunnel mode

2.ESP tunnel mode

3.both AH tunnel mode and ESP tunnel mode

4.ESP transport mode


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!