MCA/Computer Network MCA Question MCQ Set 14 Sample Test,Sample questions

Question:
 A family of network control protocols (NCPs) ______

1.Are a series of independently defined protocols that provide a dynamic

2. Are a series of independently-defined protocols that encapsulate

3.Are a series of independently defined protocols that provide transparent

4.The same as NFS


Question:
 A unidirectional path switching ring is a network with __________

1. one ring

2.two rings

3.three rings

4.four rings


Question:
 An RTP header has a minimum size of _________

1.12 bytes

2. 16 bytes

3.24 bytes

4.32 bytes


Question:
 “Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?

1.Application layer and Transport layer

2. Network layer and Application layer

3.Session layer and Transport layer

4.Application layer and Session layer


Question:
 In SONET, STS-1 level of electrical signalling has the data rate of _________

1. 51.84 Mbps

2.155.52 Mbps

3.2488.320 Mbps

4.622.080 Mbps


Question:
 RPC is a _________

1.synchronous operation

2.asynchronous operation

3. time independent operation

4. channel specific operation


Question:
 The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.

1.Link-termination phase

2.Link establishment phase

3.Authentication phase

4.Link dead phase


Question:
 The PPP protocol ____

1.Is designed for simple links which transport packets between two peers

2.Is one of the protocols for making an Internet connection over a phone line

3.Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line

4. Is used for sharing bandwidth


Question:
 What is the purpose of a shadow honeypot?

1. To flag attacks against known vulnerabilities

2. To help reduce false positives in a signature-based IDS

3.To randomly check suspicious traffic identified by an anomaly detection system

4.To enhance the accuracy of a traditional honeypot


Question:
 Which one of the following is not correct?

1. RTCP provides canonical end-point identifiers to all session participants

2.RTCP reports are expected to be sent by all participants

3. RTCP itself does not provide any flow encryption or authentication methods

4.RTCP handles the actual data delivery


Question:
A false positive can be defined as _____

1. An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior

2.An alert that indicates nefarious activity on a system that is not running on the network

3.The lack of an alert for nefarious activity

4. Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity


Question:
A linear SONET network can be ________

1.point-to-point

2.multi-point

3. both point-to-point and multi-point

4.single point


Question:
A Link Control Protocol (LCP) is used for _____

1.Establishing, configuring and testing the data-link connection

2.Establishing and configuring different network-layer protocols

3.Testing the different network-layer protocols

4.Provides for multiplexing of different network-layer protocols


Question:
A remote procedure call is _______

1.inter-process communication

2. a single process

3.a single thread

4. a single stream


Question:
A remote procedure is uniquely identified by _________

1.program number

2.version number

3.procedure number

4.all of the mentioned


Question:
An RPC (remote procedure call) is initiated by the _________

1. server

2.client

3.client after the sever

4. a third party


Question:
An RPC application requires _________

1.specific protocol for client server communication

2. a client program

3. a server program

4.all of the mentioned


Question:
An RTP session is established for ______

1.each media stream

2.all media streams

3.some predefined number of media streams

4.no media stream


Question:
At which two traffic layers do most commercial IDSes generate signatures?

1. Application layer and Network layer

2.Network layer and Session Layer

3.Transport layer and Application layer

4.Transport layer and Network layer


Question:
Automatic protection switching in linear network is defined at the _______

1. line layer

2. section layer

3.photonic layer

4. path layer


Question:
Choose the correct statement from the following.

1.PPP can terminate the link at any time

2.PPP can terminate the link only during the link establishment phase

3. PPP can terminate the link during the authentication phase

4.PPP can terminate the link during the callback control phase


Question:
EIGRP metric is ______

1.K-values

2. Bandwidth only

3.Hop Count

4.Delay only


Question:
IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?

1.Inspection of password files to detect inadvisable passwords

2.Mechanisms put in place to reenact known methods of attack and record system responses

3.Inspection of system to detect policy violations

4.Inspection of configuration files to detect inadvisable settings


Question:
In RPC, while a server is processing the call, the client is blocked ________

1. unless the client sends an asynchronous request to the server

2.unless the call processing is complete

3. for the complete duration of the connection

4.unless the server is disconnected


Question:
In SONET, each synchronous transfer signal STS-n is composed of __________

1.2000 frames

2. 4000 frames

3.8000 frames

4.16000 frames


Question:
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?

1. Inside the firewall

2.Outside the firewall

3.Both inside and outside the firewall

4.Neither inside the firewall nor outside the firewall.


Question:
PPP consists of ________components

1. Three (encapsulating, the Domain Name system)

2.Three (encapsulating, a link control protocol, NCP)

3.Two (a link control protocol, Simple Network Control protocol)

4.One (Simple Network Control protocol)


Question:
PPP provides the _______ layer in the TCP/IP suite.

1.Link

2. Network

3.Transport

4. Application


Question:
Real-time transport protocol (RTP) is mostly used in ______

1.streaming media

2.video teleconference

3.television services

4. All of the mentioned


Question:
RPC allows a computer program to cause a subroutine to execute in _________

1. its own address space

2. another address space

3.both its own address space and another address space

4.applications address space


Question:
RPC is used to ______

1. establish a server on remote machine that can respond to queries

2.retrieve information by calling a query

3.establish a server on remote machine that can respond to queries and retrieve information by calling a query

4. to secure the client


Question:
RPC works between two processes. These processes must be _______

1.on the same computer

2.on different computers connected with a network

3.on the same computer and also on different computers connected with a network

4.on none of the computers


Question:
RTP can use ________

1.unprevileleged UDP ports

2.stream control transmission protocol

3.datagram congestion control protocol

4. All of the mentioned


Question:
RTP is used to ________

1.carry the media stream

2.monitor transmission statistics of streams

3.monitor quality of service of streams

4. secure the stream


Question:
RTP provides the facility of jitter _______

1.media stream

2. expansion

3.media modification

4. Security


Question:
SONET stands for ____

1. synchronous optical network

2.synchronous operational network

3. stream optical network

4.shell operational network


Question:
The local operating system on the server machine passes the incoming packets to the _______

1.server stub

2.client stub

3.client operating system

4. client process


Question:
The path layer of SONET is responsible for the movement of a signal _________

1.from its optical source to its optical destination

2. across a physical line

3. across a physical section

4.back to its optical source


Question:
The photonic layer of the SONET is similar to the __________ of OSI model.

1.network layer

2.data link layer

3.physical layer

4.Transport layer


Question:
The PPP encapsulation _______

1.Provides for multiplexing of different network-layer protocols

2.Requires framing to indicate the beginning and end of the encapsulation

3.Establishing, configuring and testing the data-link connection

4.Provides interface for handling the capabilities of the connection/link on the network


Question:
What is SDH?

1.sdh is similar standard to SONET developed by ITU-T

2.synchronous digital hierarchy

3.sdh stands for synchronous digital hierarchy and is a similar standard to SONET developed by ITU-T

4.none of the mentioned


Question:
When discussing IDS/IPS, what is a signature?

1.An electronic signature used to authenticate the identity of a user on the network

2.Attack-definition file

3.It refers to “normal,” baseline network behavior

4.It is used to authorize the users on a network


Question:
Which of the following is an advantage of anomaly detection?

1.Rules are easy to define

2.Custom protocols can be easily analyzed

3.The engine can scale as the rule set grows

4. Malicious activity that falls within normal usage patterns is detected


Question:
Which of the following is true of signature-based IDSes?

1.They alert administrators to deviations from “normal” traffic behavior

2.They identify previously unknown attacks

3.The technology is mature and reliable enough to use on production networks

4. They scan network traffic or packets to identify matches with attack-definition files


Question:
Which of the following is used to provide a baseline measure for comparison of IDSes?

1.Crossover error rate

2. False negative rate

3.False positive rate

4.Bit error rate


Question:
Which one of the following is not true about SONET?

1.frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame

2.multiplexing is synchronous TDM

3.all clocks in the network are locked to a master clock

4. STS-1 provides the data rate of 622.080Mbps


Question:
Which one of the following multimedia formats can not be supported by RTP?

1.MPEG-4

2.MJPEG

3.MPEG

4. TXT


Question:
Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?

1. SRTP

2. RTCP

3.RCP

4.RTCT


Question:
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?

1.LCP

2. NCP

3.Both LCP and NCP

4. TCP


Question:
Which protocol provides the synchronization between media streams?

1.RTP

2.RTCP

3.RPC

4.RTCT


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!