MCA/Computer Network MCA Question MCQ Set 7 Sample Test,Sample questions

Question:
 In segment header, sequence number and acknowledgement number fields refer to _______

1.Byte number

2.Buffer number

3. Segment number

4.Acknowledgment

Posted Date:-2021-12-27 10:11:11


Question:
 IP Security operates in which layer of the OSI model?

1.Network

2. Transport

3.Application

4. Physical

Posted Date:-2021-12-27 10:28:12


Question:
 The decimal code of Interpret as Command (IAC) character is _______

1.252

2.253

3.254

4.255

Posted Date:-2021-12-27 09:59:55


Question:
 The receiver of the data controls the amount of data that are to be sent by the sender is referred to as _________

1. Flow control

2.Error control

3.Congestion control

4.Error detection

Posted Date:-2021-12-27 10:13:14


Question:
 ______ provides authentication at the IP level.

1.AH

2.ESP

3.PGP

4.SSL

Posted Date:-2021-12-27 10:27:28


Question:
. IPsec defines two protocols: _______ and ________

1.AH; SSL

2.PGP; ESP

3. AH; ESP

4.PGP; SSL

Posted Date:-2021-12-27 10:27:49


Question:
A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ______

1. Active open

2.Active close

3.Passive close

4. Passive open

Posted Date:-2021-12-27 10:15:02


Question:
A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?

1. SYNC flooding attack

2. Active attack

3.Passive attack

4.Denial-of-service attack

Posted Date:-2021-12-27 10:15:53


Question:
AbsoluteTelnet is a telnet client for _______ Operating system.

1.windows

2. linux

3.mac

4.ubuntu

Posted Date:-2021-12-27 09:59:30


Question:
“Total length” field in UDP packet header is the length of _________

1.Only UDP header

2.Only data

3.Only checksum

4. UDP header plus data

Posted Date:-2021-12-27 10:24:36


Question:
Beyond IP, UDP provides additional services such as _______

1.Routing and switching

2. Sending and receiving of packets

3.Multiplexing and demultiplexing

4.Demultiplexing and error checking

Posted Date:-2021-12-27 10:21:34


Question:
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________

1.Fixed number

2.Random sequence of 0’s and 1’s

3.One

4.Sequence of zero’s and one’s

Posted Date:-2021-12-27 10:11:56


Question:
Communication offered by TCP is ________

1.Full-duplex

2.Half-duplex

3.Semi-duplex

4.Byte by byte

Posted Date:-2021-12-27 10:10:18


Question:
Connection establishment in TCP is done by which mechanism?

1.Flow control

2.Three-Way Handshaking

3.Forwarding

4.Synchronization

Posted Date:-2021-12-27 10:14:04


Question:
ESP does not provide ________

1. source authentication

2. data integrity

3. privacy

4.error control

Posted Date:-2021-12-27 10:28:35


Question:
If we want that a character be interpreted by the client instead of server ______

1. interpret as command (IAC) escape character has to be used

2.control functions has to be disabled

3. it is not possible

4.cli character has to be used

Posted Date:-2021-12-27 09:48:12


Question:
In computer security _______ means that computer system assets can be modified only by authorized parities.

1.confidentiality

2. integrity

3. availability

4.authenticity

Posted Date:-2021-12-27 10:28:57


Question:
In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.

1.confidentiality

2.integrity

3.availability

4.authenticity

Posted Date:-2021-12-27 10:29:22


Question:
In TCP, sending and receiving data is done as _______

1.Stream of bytes

2.Sequence of characters

3. Lines of data

4.Packets

Posted Date:-2021-12-27 10:09:11


Question:
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ________

1.Mutual open

2.Mutual Close

3.Simultaneous open

4. Simultaneous close

Posted Date:-2021-12-27 10:15:27


Question:
In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?

1.default mode

2.character mode

3. server mode

4.command mode

Posted Date:-2021-12-27 10:07:33


Question:
Port number used by Network Time Protocol (NTP) with UDP is ____

1.161

2.123

3.162

4.124

Posted Date:-2021-12-27 10:23:30


Question:
Return value of the UDP port “Chargen” is _______

1. String of characters

2.String of integers

3.Array of characters with integers

4.Array of zero’s and one’s

Posted Date:-2021-12-27 10:20:17


Question:
Size of TCP segment header ranges between ______

1.16 and 32 bytes

2.16 and 32 bits

3.20 and 60 bytes

4.20 and 60 bits

Posted Date:-2021-12-27 10:13:40


Question:
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?

1.10000

2.10001

3. 12001

4. 11001

Posted Date:-2021-12-27 10:11:33


Question:
SYNC flooding attack belongs to a type of security attack known as _____

1.SYNC flooding attack

2.Active attack

3.Passive attack

4. Denial-of-service attack

Posted Date:-2021-12-27 10:16:22


Question:
TCP groups a number of bytes together into a packet called _______

1. Packet

2. Buffer

3.Segment

4.Stack

Posted Date:-2021-12-27 10:09:57


Question:
TCP process may not write and read data at the same speed. So we need __________ for storage.

1.Packets

2.Buffers

3.Segments

4. Stacks

Posted Date:-2021-12-27 10:09:33


Question:
Telnet protocol is used to establish a connection to ______

1.TCP port number 21

2.TCP port number 22

3.TCP port number 23

4.TCP port number 25

Posted Date:-2021-12-27 09:49:18


Question:
The port number is “ephemeral port number”, if the source host is _______

1.NTP

2.Echo

3.Server

4. Client

Posted Date:-2021-12-27 10:24:12


Question:
The server program tells its TCP that it is ready to accept a connection. This process is called _____

1.Active open

2. Active close

3.Passive close

4.Passive open

Posted Date:-2021-12-27 10:14:32


Question:
The sizes of source and destination port address in TCP header are ___________ respectively.

1. 16-bits and 32-bits

2.16-bits and 16-bits

3.32-bits and 16-bits

4. 32-bits and 32-bits

Posted Date:-2021-12-27 10:16:52


Question:
The value of acknowledgement field in a segment defines _______

1.sequence number of the byte received previously

2.total number of bytes to receive

3. sequence number of the next byte to be received

4. sequence of zeros and ones

Posted Date:-2021-12-27 10:12:30


Question:
The ______ field is used to detect errors over the entire user datagram.

1.udp header

2.checksum

3.source port

4.destination port

Posted Date:-2021-12-27 10:25:28


Question:
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.

1.Packet

2.Buffer

3.Segment

4. Acknowledgment

Posted Date:-2021-12-27 10:10:42


Question:
What allows TCP to detect lost segments and in turn recover from that loss?

1. Sequence number

2.Acknowledgment number

3.Checksum

4.Both Sequence & Acknowledgment number

Posted Date:-2021-12-27 10:19:17


Question:
What is the header size of a UDP packet?

1. 8 bytes

2.8 bits

3.16 bytes

4.124 bytes

Posted Date:-2021-12-27 10:23:51


Question:
What is the main advantage of UDP?

1.More overload

2.Reliable

3.Low overhead

4.Fast

Posted Date:-2021-12-27 10:22:53


Question:
Which is the correct expression for the length of UDP datagram?

1.UDP length = IP length – IP header’s length

2.UDP length = UDP length – UDP header’s length

3.UDP length = IP length + IP header’s length

4.UDP length = UDP length + UDP header’s length

Posted Date:-2021-12-27 10:25:04


Question:
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?

1.AH transport mode

2.ESP transport mode

3.ESP tunnel mode

4. AH tunnel mode

Posted Date:-2021-12-27 10:26:12


Question:
Which of the following is false with respect to TCP?

1.Connection-oriented

2.Process-to-process

3.Transport layer protocol

4.Unreliable

Posted Date:-2021-12-27 10:08:45


Question:
Which of the following is false with respect to UDP?

1.Connection-oriented

2.Unreliable

3.Transport layer protocol

4.Low overhead

Posted Date:-2021-12-27 10:19:54


Question:
Which of the following is true for character mode operation of telnet implementation?

1.each character typed is sent by the client to the server

2. each character typed is discarded by the server

3.each character typed is aggregated into a word and then sent to the server

4.each character type is aggregated into a line and then sent to the server

Posted Date:-2021-12-27 10:04:02


Question:
Which of the following organizations is primarily concerned with military encryption systems?

1.NSA

2. NIST

3. IEEE

4.ITU

Posted Date:-2021-12-27 10:29:44


Question:
Which one of the following is not correct?

1. telnet is a general purpose client-server program

2.telnet lets user access an application on a remote computer

3. telnet can also be used for file transfer

4.telnet can be used for remote login

Posted Date:-2021-12-27 09:47:20


Question:
Which one of the following is not correct?

1. telnet is a general purpose client-server program

2.telnet lets user access an application on a remote computer

3.telnet can also be used for file transfer

4.telnet can be used for remote login

Posted Date:-2021-12-27 10:08:07


Question:
Which one of the following is not true?

1. telnet defines a network virtual terminal (NVT) standard

2.client programs interact with NVT

3.server translates NVT operations

4.client can transfer files using to remote server using NVT

Posted Date:-2021-12-27 09:49:47


Question:
Which operating mode of telnet is full duplex?

1. default mode

2.server mode

3.line mode

4.character mode

Posted Date:-2021-12-27 09:47:43


Question:
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

1.Kerberos V5

2. SHA

3.MD5

4.Both SHA and MD5

Posted Date:-2021-12-27 10:26:36


Question:
Which two types of IPsec can be used to secure communications between two LANs?

1.AH tunnel mode

2.ESP tunnel mode

3.both AH tunnel mode and ESP tunnel mode

4.ESP transport mode

Posted Date:-2021-12-27 10:27:06


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
  15. MCA MCQ Question
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!