In segment header, sequence number and acknowledgement number fields refer to _______
1.Byte number
2.Buffer number
3. Segment number
4.Acknowledgment
Posted Date:-2021-12-27 10:11:11
IP Security operates in which layer of the OSI model?
1.Network
2. Transport
3.Application
4. Physical
Posted Date:-2021-12-27 10:28:12
The decimal code of Interpret as Command (IAC) character is _______
1.252
2.253
3.254
4.255
Posted Date:-2021-12-27 09:59:55
The receiver of the data controls the amount of data that are to be sent by the sender is referred to as _________
1. Flow control
2.Error control
3.Congestion control
4.Error detection
Posted Date:-2021-12-27 10:13:14
______ provides authentication at the IP level.
1.AH
2.ESP
3.PGP
4.SSL
Posted Date:-2021-12-27 10:27:28
. IPsec defines two protocols: _______ and ________
1.AH; SSL
2.PGP; ESP
3. AH; ESP
4.PGP; SSL
Posted Date:-2021-12-27 10:27:49
A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ______
1. Active open
2.Active close
3.Passive close
4. Passive open
Posted Date:-2021-12-27 10:15:02
A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?
1. SYNC flooding attack
2. Active attack
3.Passive attack
4.Denial-of-service attack
Posted Date:-2021-12-27 10:15:53
AbsoluteTelnet is a telnet client for _______ Operating system.
1.windows
2. linux
3.mac
4.ubuntu
Posted Date:-2021-12-27 09:59:30
“Total length†field in UDP packet header is the length of _________
1.Only UDP header
2.Only data
3.Only checksum
4. UDP header plus data
Posted Date:-2021-12-27 10:24:36
Beyond IP, UDP provides additional services such as _______
1.Routing and switching
2. Sending and receiving of packets
3.Multiplexing and demultiplexing
4.Demultiplexing and error checking
Posted Date:-2021-12-27 10:21:34
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________
1.Fixed number
2.Random sequence of 0’s and 1’s
3.One
4.Sequence of zero’s and one’s
Posted Date:-2021-12-27 10:11:56
Communication offered by TCP is ________
1.Full-duplex
2.Half-duplex
3.Semi-duplex
4.Byte by byte
Posted Date:-2021-12-27 10:10:18
Connection establishment in TCP is done by which mechanism?
1.Flow control
2.Three-Way Handshaking
3.Forwarding
4.Synchronization
Posted Date:-2021-12-27 10:14:04
ESP does not provide ________
1. source authentication
2. data integrity
3. privacy
4.error control
Posted Date:-2021-12-27 10:28:35
If we want that a character be interpreted by the client instead of server ______
1. interpret as command (IAC) escape character has to be used
2.control functions has to be disabled
3. it is not possible
4.cli character has to be used
Posted Date:-2021-12-27 09:48:12
In computer security _______ means that computer system assets can be modified only by authorized parities.
1.confidentiality
2. integrity
3. availability
4.authenticity
Posted Date:-2021-12-27 10:28:57
In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.
1.confidentiality
2.integrity
3.availability
4.authenticity
Posted Date:-2021-12-27 10:29:22
In TCP, sending and receiving data is done as _______
1.Stream of bytes
2.Sequence of characters
3. Lines of data
4.Packets
Posted Date:-2021-12-27 10:09:11
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ________
1.Mutual open
2.Mutual Close
3.Simultaneous open
4. Simultaneous close
Posted Date:-2021-12-27 10:15:27
In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?
1.default mode
2.character mode
3. server mode
4.command mode
Posted Date:-2021-12-27 10:07:33
Port number used by Network Time Protocol (NTP) with UDP is ____
1.161
2.123
3.162
4.124
Posted Date:-2021-12-27 10:23:30
Return value of the UDP port “Chargen†is _______
1. String of characters
2.String of integers
3.Array of characters with integers
4.Array of zero’s and one’s
Posted Date:-2021-12-27 10:20:17
Size of TCP segment header ranges between ______
1.16 and 32 bytes
2.16 and 32 bits
3.20 and 60 bytes
4.20 and 60 bits
Posted Date:-2021-12-27 10:13:40
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
1.10000
2.10001
3. 12001
4. 11001
Posted Date:-2021-12-27 10:11:33
SYNC flooding attack belongs to a type of security attack known as _____
1.SYNC flooding attack
2.Active attack
3.Passive attack
4. Denial-of-service attack
Posted Date:-2021-12-27 10:16:22
TCP groups a number of bytes together into a packet called _______
1. Packet
2. Buffer
3.Segment
4.Stack
Posted Date:-2021-12-27 10:09:57
TCP process may not write and read data at the same speed. So we need __________ for storage.
1.Packets
2.Buffers
3.Segments
4. Stacks
Posted Date:-2021-12-27 10:09:33
Telnet protocol is used to establish a connection to ______
1.TCP port number 21
2.TCP port number 22
3.TCP port number 23
4.TCP port number 25
Posted Date:-2021-12-27 09:49:18
The port number is “ephemeral port numberâ€, if the source host is _______
1.NTP
2.Echo
3.Server
4. Client
Posted Date:-2021-12-27 10:24:12
The server program tells its TCP that it is ready to accept a connection. This process is called _____
1.Active open
2. Active close
3.Passive close
4.Passive open
Posted Date:-2021-12-27 10:14:32
The sizes of source and destination port address in TCP header are ___________ respectively.
1. 16-bits and 32-bits
2.16-bits and 16-bits
3.32-bits and 16-bits
4. 32-bits and 32-bits
Posted Date:-2021-12-27 10:16:52
The value of acknowledgement field in a segment defines _______
1.sequence number of the byte received previously
2.total number of bytes to receive
3. sequence number of the next byte to be received
4. sequence of zeros and ones
Posted Date:-2021-12-27 10:12:30
The ______ field is used to detect errors over the entire user datagram.
1.udp header
2.checksum
3.source port
4.destination port
Posted Date:-2021-12-27 10:25:28
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
1.Packet
2.Buffer
3.Segment
4. Acknowledgment
Posted Date:-2021-12-27 10:10:42
What allows TCP to detect lost segments and in turn recover from that loss?
1. Sequence number
2.Acknowledgment number
3.Checksum
4.Both Sequence & Acknowledgment number
Posted Date:-2021-12-27 10:19:17
What is the header size of a UDP packet?
1. 8 bytes
2.8 bits
3.16 bytes
4.124 bytes
Posted Date:-2021-12-27 10:23:51
What is the main advantage of UDP?
1.More overload
2.Reliable
3.Low overhead
4.Fast
Posted Date:-2021-12-27 10:22:53
Which is the correct expression for the length of UDP datagram?
1.UDP length = IP length – IP header’s length
2.UDP length = UDP length – UDP header’s length
3.UDP length = IP length + IP header’s length
4.UDP length = UDP length + UDP header’s length
Posted Date:-2021-12-27 10:25:04
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
1.AH transport mode
2.ESP transport mode
3.ESP tunnel mode
4. AH tunnel mode
Posted Date:-2021-12-27 10:26:12
Which of the following is false with respect to TCP?
1.Connection-oriented
2.Process-to-process
3.Transport layer protocol
4.Unreliable
Posted Date:-2021-12-27 10:08:45
Which of the following is false with respect to UDP?
1.Connection-oriented
2.Unreliable
3.Transport layer protocol
4.Low overhead
Posted Date:-2021-12-27 10:19:54
Which of the following is true for character mode operation of telnet implementation?
1.each character typed is sent by the client to the server
2. each character typed is discarded by the server
3.each character typed is aggregated into a word and then sent to the server
4.each character type is aggregated into a line and then sent to the server
Posted Date:-2021-12-27 10:04:02
Which of the following organizations is primarily concerned with military encryption systems?
1.NSA
2. NIST
3. IEEE
4.ITU
Posted Date:-2021-12-27 10:29:44
Which one of the following is not correct?
1. telnet is a general purpose client-server program
2.telnet lets user access an application on a remote computer
3. telnet can also be used for file transfer
4.telnet can be used for remote login
Posted Date:-2021-12-27 09:47:20
Which one of the following is not correct?
1. telnet is a general purpose client-server program
2.telnet lets user access an application on a remote computer
3.telnet can also be used for file transfer
4.telnet can be used for remote login
Posted Date:-2021-12-27 10:08:07
Which one of the following is not true?
1. telnet defines a network virtual terminal (NVT) standard
2.client programs interact with NVT
3.server translates NVT operations
4.client can transfer files using to remote server using NVT
Posted Date:-2021-12-27 09:49:47
Which operating mode of telnet is full duplex?
1. default mode
2.server mode
3.line mode
4.character mode
Posted Date:-2021-12-27 09:47:43
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
1.Kerberos V5
2. SHA
3.MD5
4.Both SHA and MD5
Posted Date:-2021-12-27 10:26:36
Which two types of IPsec can be used to secure communications between two LANs?
1.AH tunnel mode
2.ESP tunnel mode
3.both AH tunnel mode and ESP tunnel mode
4.ESP transport mode
Posted Date:-2021-12-27 10:27:06