MCA/Computer Network MCA Question MCQ Set 6 Sample Test,Sample questions

Question:
 If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

1.MAC address

2.IP address

3.Both MAC address and IP address

4. None of the mentioned

Posted Date:-2021-12-27 09:24:09


Question:
 L2F was developed by which company?

1. Microsoft

2.Cisco

3.Blizzard Entertainment

4. IETF

Posted Date:-2021-12-27 09:33:20


Question:
 The DHCP server can provide the _______ of the IP addresses.

1.dynamic allocation

2. automatic allocation

3. static allocation

4.all of the mentioned

Posted Date:-2021-12-27 09:22:29


Question:
 Which component is included in IP security?

1.Authentication Header (AH)

2.Encapsulating Security Payload (ESP)

3. Internet key Exchange (IKE)

4.all of the mentioned

Posted Date:-2021-12-27 09:25:42


Question:
 Which layer 3 protocols can be transmitted over an L2TP VPN?

1.Only IP

2.Only IPX

3.Only ICMP

4. IP and IPX

Posted Date:-2021-12-27 09:32:29


Question:
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.

1. VNP

2. VPN

3.VSN

4.VSPN

Posted Date:-2021-12-27 09:28:50


Question:
After obtaining the IP address, to prevent the IP conflict the client may use ____

1. internet relay chat

2.broader gateway protocol

3. address resolution protocol

4.none of the mentioned

Posted Date:-2021-12-27 09:23:18


Question:
Among the following, identify which task is not involved in Storage Capacity management?

1. Identifying storage systems are approaching full capacity

2.Monitoring trends for each resource

3. Tracking Total capacity, total used, total available

4.Preventing unauthorized access to the storage

Posted Date:-2021-12-27 09:38:03


Question:
An attempt to make a computer resource unavailable to its intended users is called ______

1. Denial-of-service attack

2.Virus attack

3.Worms attack

4.Botnet process

Posted Date:-2021-12-27 09:26:31


Question:
BER stands for ________

1.Basic Encoding Rules

2.Basic Encoding Resolver

3.Basic Encoding Rotator

4.Basic Encoding Router

Posted Date:-2021-12-27 09:42:37


Question:
Configuration management can be divided into which two subsystems?

1. Reconfiguration and documentation

2.Management and configuration

3.Documentation and dialing up

4.Configuration and dialing up

Posted Date:-2021-12-27 09:40:56


Question:
Control of the users’ access to network resources through charges is the main responsibility of ________

1.Reactive Fault Management

2.Reconfigured Fault Management

3.Accounting Management

4. Security Management

Posted Date:-2021-12-27 09:43:00


Question:
DHCP client and servers on the same subnet communicate via _________

1. UDP broadcast

2.UDP unicast

3.TCP broadcast

4. TCP unicast

Posted Date:-2021-12-27 09:22:55


Question:
Effect of open standards like SMI(s) is _________

1.standardization drives software interoperability and interchange ability

2. breaks the old-style dependence on proprietary methods, trade secrets, and single providers

3.builds a strong foundation on which others can quickly build and innovate

4.all of the mentioned

Posted Date:-2021-12-27 09:38:27


Question:
Effective Storage management does not include ____

1.security

2.backups

3.reporting

4. connection

Posted Date:-2021-12-27 09:37:36


Question:
ESP (Encapsulating Security Protocol) is defined in which of the following standards?

1.IPsec

2.PPTP

3.PPP

4.L2TP

Posted Date:-2021-12-27 09:32:53


Question:
Extensible authentication protocol is authentication framework frequently used in ______

1.Wired personal area network

2.Wireless networks

3.Wired local area network

4.Wired metropolitan area network

Posted Date:-2021-12-27 09:27:00


Question:
Full duplex mode increases the capacity of each domain by ________

1.10 to 20 mbps

2.20 to 30 mbps

3. 30 to 40 mbps

4.40 to 50 mbps

Posted Date:-2021-12-27 09:40:31


Question:
How do Storage administrators ensure secure access to storage devices?

1.By using Zoning

2.By putting a physical lock on the storage device

3. By keeping devices shutdown when not in use

4.By keeping devices when used

Posted Date:-2021-12-27 09:37:13


Question:
Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.

1.Proprietary management interfaces

2.Multiple applications to manage storage in the data center

3.No single view

4. Single view

Posted Date:-2021-12-27 09:36:48


Question:
In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________

1.Fault Management

2.Secured Management

3.Active Management

4. Security Management

Posted Date:-2021-12-27 09:42:10


Question:
In tunnel mode, IPSec protects the ______

1.Entire IP packet

2.IP header

3.IP payload

4.IP trailer

Posted Date:-2021-12-27 09:25:11


Question:
IPSec is designed to provide security at the _______

1. Transport layer

2.Network layer

3.Application layer

4.Session layer

Posted Date:-2021-12-27 09:24:46


Question:
PGP encrypts data by using a block cipher called ______

1. International data encryption algorithm

2. Private data encryption algorithm

3.Internet data encryption algorithm

4.Local data encryption algorithm

Posted Date:-2021-12-27 09:27:49


Question:
Pretty good privacy (PGP) is used in ______

1. Browser security

2.Email security

3.FTP security

4.WiFi security

Posted Date:-2021-12-27 09:27:25


Question:
SMI-S Standard uses which of the following?

1.Java RMI

2.CIM-XML/HTTP

3.CORBA

4..NET

Posted Date:-2021-12-27 09:39:20


Question:
SNMP is the framework for managing devices in an internet using the ______

1.TCP/IP protocol

2.UDP

3.SMTP

4.None

Posted Date:-2021-12-27 09:43:25


Question:
Storage management comprises of ________

1.SAN Management

2.Data protection

3.Disk operation

4.all of the mentioned

Posted Date:-2021-12-27 09:35:29


Question:
Structure of Management Information (SMI), is the guideline of ________

1.HTTP

2.SNMP

3. URL

4. MIB

Posted Date:-2021-12-27 09:43:51


Question:
Task of Distributed Management Task Force is not ________

1.to promote interoperability among the management solution providers

2. to act as an interface between the various budding technologies and provide solution to manage various environments

3.to track the operation of the different management solution providers

4.to manage the facility by itself if one of the management solution providers fail

Posted Date:-2021-12-27 09:38:56


Question:
Telnet is used for _______

1.Television on net

2.Network of Telephones

3.Remote Login

4.Teleshopping site

Posted Date:-2021-12-27 09:46:15


Question:
The application layer protocol used by a Telnet application is ________

1.Telnet

2.FTP

3.HTTP

4.SMTP

Posted Date:-2021-12-27 09:44:28


Question:
The application-level protocol in which a few manager stations control a set of agents is called ______

1.HTML

2.TCP

3.SNMP

4.SNMP/IP

Posted Date:-2021-12-27 09:40:02


Question:
The main difference between SNMPv3 and SNMPv2 is _______

1.Management

2.Integration

3. Classification

4.Enhanced security

Posted Date:-2021-12-27 09:41:43


Question:
To use a Simple Network Management System, we need _______

1.Servers

2.IP

3.Protocols

4. Rules

Posted Date:-2021-12-27 09:41:19


Question:
Traffic in a VPN is NOT _______

1. Invisible from public networks

2.Logically separated from other traffic

3. Accessible from unauthorized public networks

4.Restricted to a single protocol in IPsec

Posted Date:-2021-12-27 09:31:20


Question:
VPNs are financially speaking ______

1.Always more expensive than leased lines

2.Always cheaper than leased lines

3.Usually cheaper than leased lines

4.Usually more expensive than leased lines

Posted Date:-2021-12-27 09:31:54


Question:
What is DHCP snooping?

1.techniques applied to ensure the security of an existing DHCP infrastructure

2. encryption of the DHCP server requests

3. algorithm for DHCP

4.none of the mentioned

Posted Date:-2021-12-27 09:23:43


Question:
What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?

1.telnet//www.sanfoundry.com

2. telnet:www.sanfoundry.com

3. telnet://www.sanfoundry.com

4.telnet www.sanfoundry.com

Posted Date:-2021-12-27 09:45:48


Question:
What protocol is NOT used in the operation of a VPN?

1. PPTP

2.IPsec

3.YMUM

4. L2TP

Posted Date:-2021-12-27 09:30:23


Question:
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________

1.DNS lookup

2. DNS hijacking

3.DNS spoofing

4.DNS authorizing

Posted Date:-2021-12-27 09:28:13


Question:
When were VPNs introduced into the commercial world?

1.Early 80’s

2.Late 80’s

3.Early 90’s

4.Late 90’s

Posted Date:-2021-12-27 09:29:16


Question:
Which amongst the following statements is correct for “character at a time” mode?

1.Character processing is done on the local system under the control of the remote system

2.Most text typed is immediately sent to the remote host for processing

3.All text is echoed locally, only completed lines are sent to the remote host

4.All text is processed locally, and only confirmed lines are sent to the remote host

Posted Date:-2021-12-27 09:44:56


Question:
Which layer of the OSI reference model does IPsec work at?

1. Layer 1

2.Layer 2

3.Layer 3

4.Layer 4

Posted Date:-2021-12-27 09:34:18


Question:
Which layer of the OSI reference model does PPTP work at?

1.Layer 1

2. Layer 2

3. Layer 3

4. Layer 4

Posted Date:-2021-12-27 09:33:44


Question:
Which of the following is not a storage device?

1.Switch

2.RAID Arrays

3. Tape drives

4.Hub

Posted Date:-2021-12-27 09:35:54


Question:
Which of the following statements is NOT true concerning VPNs?

1. Financially rewarding compared to leased lines

2. Allows remote workers to access corporate data

3.Allows LAN-to-LAN connectivity over public networks

4.Is the backbone of the Internet

Posted Date:-2021-12-27 09:30:55


Question:
Which protocols are used for Storage management?

1.SNMP

2.LDAP

3.POP3

4.MIB

Posted Date:-2021-12-27 09:36:18


Question:
WPA2 is used for security in _______

1. Ethernet

2.Bluetooth

3.Wi-Fi

4.Email

Posted Date:-2021-12-27 09:26:07


Question:
_______ allows you to connect and login to a remote computer

1.Telnet

2.FTP

3.HTTP

4.SMTP

Posted Date:-2021-12-27 09:45:23


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
  15. MCA MCQ Question
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!