MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 7

Choose a topic to test your knowledge and improve your MCA skills

Which one of the following is not correct?





✅ Correct Answer: 3

Which operating mode of telnet is full duplex?





✅ Correct Answer: 3

If we want that a character be interpreted by the client instead of server ______





✅ Correct Answer: 1

Telnet protocol is used to establish a connection to ______





✅ Correct Answer: 3

Which one of the following is not true?





✅ Correct Answer: 4

AbsoluteTelnet is a telnet client for _______ Operating system.





✅ Correct Answer: 1

The decimal code of Interpret as Command (IAC) character is _______





✅ Correct Answer: 4

Which of the following is true for character mode operation of telnet implementation?





✅ Correct Answer: 1

In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?





✅ Correct Answer: 1

Which one of the following is not correct?





✅ Correct Answer: 3

Which of the following is false with respect to TCP?





✅ Correct Answer: 4

In TCP, sending and receiving data is done as _______





✅ Correct Answer: 1

TCP process may not write and read data at the same speed. So we need __________ for storage.





✅ Correct Answer: 2

TCP groups a number of bytes together into a packet called _______





✅ Correct Answer: 3

Communication offered by TCP is ________





✅ Correct Answer: 1

To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.





✅ Correct Answer: 4

In segment header, sequence number and acknowledgement number fields refer to _______





✅ Correct Answer: 1

Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?





✅ Correct Answer: 2

Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________





✅ Correct Answer: 4

The value of acknowledgement field in a segment defines _______





✅ Correct Answer: 3

The receiver of the data controls the amount of data that are to be sent by the sender is referred to as _________





✅ Correct Answer: 1

Size of TCP segment header ranges between ______





✅ Correct Answer: 3

Connection establishment in TCP is done by which mechanism?





✅ Correct Answer: 2

The server program tells its TCP that it is ready to accept a connection. This process is called _____





✅ Correct Answer: 4

A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ______





✅ Correct Answer: 1

In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ________





✅ Correct Answer: 3

A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?





✅ Correct Answer: 1

SYNC flooding attack belongs to a type of security attack known as _____





✅ Correct Answer: 4

The sizes of source and destination port address in TCP header are ___________ respectively.





✅ Correct Answer: 2

What allows TCP to detect lost segments and in turn recover from that loss?





✅ Correct Answer: 2

Which of the following is false with respect to UDP?





✅ Correct Answer: 1

Return value of the UDP port “Chargen” is _______





✅ Correct Answer: 1

Beyond IP, UDP provides additional services such as _______





✅ Correct Answer: 4

What is the main advantage of UDP?





✅ Correct Answer: 3

Port number used by Network Time Protocol (NTP) with UDP is ____





✅ Correct Answer: 2

What is the header size of a UDP packet?





✅ Correct Answer: 1

The port number is “ephemeral port number”, if the source host is _______





✅ Correct Answer: 4

“Total length” field in UDP packet header is the length of _________





✅ Correct Answer: 4

Which is the correct expression for the length of UDP datagram?





✅ Correct Answer: 1

The ______ field is used to detect errors over the entire user datagram.





✅ Correct Answer: 2

Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?





✅ Correct Answer: 2

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?





✅ Correct Answer: 4

Which two types of IPsec can be used to secure communications between two LANs?





✅ Correct Answer: 3

______ provides authentication at the IP level.





✅ Correct Answer: 1

. IPsec defines two protocols: _______ and ________





✅ Correct Answer: 3

IP Security operates in which layer of the OSI model?





✅ Correct Answer: 1

ESP does not provide ________





✅ Correct Answer: 4

In computer security _______ means that computer system assets can be modified only by authorized parities.





✅ Correct Answer: 2

In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.





✅ Correct Answer: 1

Which of the following organizations is primarily concerned with military encryption systems?





✅ Correct Answer: 1