Choose a topic to test your knowledge and improve your MCA skills
Which one of the following is not correct?
Which operating mode of telnet is full duplex?
If we want that a character be interpreted by the client instead of server ______
Telnet protocol is used to establish a connection to ______
Which one of the following is not true?
AbsoluteTelnet is a telnet client for _______ Operating system.
The decimal code of Interpret as Command (IAC) character is _______
Which of the following is true for character mode operation of telnet implementation?
In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?
Which one of the following is not correct?
Which of the following is false with respect to TCP?
In TCP, sending and receiving data is done as _______
TCP process may not write and read data at the same speed. So we need __________ for storage.
TCP groups a number of bytes together into a packet called _______
Communication offered by TCP is ________
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
In segment header, sequence number and acknowledgement number fields refer to _______
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________
The value of acknowledgement field in a segment defines _______
The receiver of the data controls the amount of data that are to be sent by the sender is referred to as _________
Size of TCP segment header ranges between ______
Connection establishment in TCP is done by which mechanism?
The server program tells its TCP that it is ready to accept a connection. This process is called _____
A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ______
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ________
A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?
SYNC flooding attack belongs to a type of security attack known as _____
The sizes of source and destination port address in TCP header are ___________ respectively.
What allows TCP to detect lost segments and in turn recover from that loss?
Which of the following is false with respect to UDP?
Return value of the UDP port “Chargen” is _______
Beyond IP, UDP provides additional services such as _______
What is the main advantage of UDP?
Port number used by Network Time Protocol (NTP) with UDP is ____
What is the header size of a UDP packet?
The port number is “ephemeral port number”, if the source host is _______
“Total length” field in UDP packet header is the length of _________
Which is the correct expression for the length of UDP datagram?
The ______ field is used to detect errors over the entire user datagram.
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
Which two types of IPsec can be used to secure communications between two LANs?
______ provides authentication at the IP level.
. IPsec defines two protocols: _______ and ________
IP Security operates in which layer of the OSI model?
ESP does not provide ________
In computer security _______ means that computer system assets can be modified only by authorized parities.
In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.
Which of the following organizations is primarily concerned with military encryption systems?