R4RIN
Articles
Java 8
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 6
Choose a topic to test your knowledge and improve your MCA skills
1. The DHCP server can provide the _______ of the IP addresses.
dynamic allocation
automatic allocation
static allocation
all of the mentioned
2. DHCP client and servers on the same subnet communicate via _________
UDP broadcast
UDP unicast
TCP broadcast
TCP unicast
3. After obtaining the IP address, to prevent the IP conflict the client may use ____
internet relay chat
broader gateway protocol
address resolution protocol
none of the mentioned
4. What is DHCP snooping?
techniques applied to ensure the security of an existing DHCP infrastructure
encryption of the DHCP server requests
algorithm for DHCP
none of the mentioned
5. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
MAC address
IP address
Both MAC address and IP address
None of the mentioned
6. IPSec is designed to provide security at the _______
Transport layer
Network layer
Application layer
Session layer
7. In tunnel mode, IPSec protects the ______
Entire IP packet
IP header
IP payload
IP trailer
8. Which component is included in IP security?
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Internet key Exchange (IKE)
all of the mentioned
9. WPA2 is used for security in _______
Ethernet
Bluetooth
Wi-Fi
Email
10. An attempt to make a computer resource unavailable to its intended users is called ______
Denial-of-service attack
Virus attack
Worms attack
Botnet process
11. Extensible authentication protocol is authentication framework frequently used in ______
Wired personal area network
Wireless networks
Wired local area network
Wired metropolitan area network
12. Pretty good privacy (PGP) is used in ______
Browser security
Email security
FTP security
WiFi security
13. PGP encrypts data by using a block cipher called ______
International data encryption algorithm
Private data encryption algorithm
Internet data encryption algorithm
Local data encryption algorithm
14. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________
DNS lookup
DNS hijacking
DNS spoofing
DNS authorizing
15. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.
VNP
VPN
VSN
VSPN
16. When were VPNs introduced into the commercial world?
Early 80’s
Late 80’s
Early 90’s
Late 90’s
17. What protocol is NOT used in the operation of a VPN?
PPTP
IPsec
YMUM
L2TP
18. Which of the following statements is NOT true concerning VPNs?
Financially rewarding compared to leased lines
Allows remote workers to access corporate data
Allows LAN-to-LAN connectivity over public networks
Is the backbone of the Internet
19. Traffic in a VPN is NOT _______
Invisible from public networks
Logically separated from other traffic
Accessible from unauthorized public networks
Restricted to a single protocol in IPsec
20. VPNs are financially speaking ______
Always more expensive than leased lines
Always cheaper than leased lines
Usually cheaper than leased lines
Usually more expensive than leased lines
21. Which layer 3 protocols can be transmitted over an L2TP VPN?
Only IP
Only IPX
Only ICMP
IP and IPX
22. ESP (Encapsulating Security Protocol) is defined in which of the following standards?
IPsec
PPTP
PPP
L2TP
23. L2F was developed by which company?
Microsoft
Cisco
Blizzard Entertainment
IETF
24. Which layer of the OSI reference model does PPTP work at?
Layer 1
Layer 2
Layer 3
Layer 4
25. Which layer of the OSI reference model does IPsec work at?
Layer 1
Layer 2
Layer 3
Layer 4
26. Storage management comprises of ________
SAN Management
Data protection
Disk operation
all of the mentioned
27. Which of the following is not a storage device?
Switch
RAID Arrays
Tape drives
Hub
28. Which protocols are used for Storage management?
SNMP
LDAP
POP3
MIB
29. Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.
Proprietary management interfaces
Multiple applications to manage storage in the data center
No single view
Single view
30. How do Storage administrators ensure secure access to storage devices?
By using Zoning
By putting a physical lock on the storage device
By keeping devices shutdown when not in use
By keeping devices when used
31. Effective Storage management does not include ____
security
backups
reporting
connection
32. Among the following, identify which task is not involved in Storage Capacity management?
Identifying storage systems are approaching full capacity
Monitoring trends for each resource
Tracking Total capacity, total used, total available
Preventing unauthorized access to the storage
33. Effect of open standards like SMI(s) is _________
standardization drives software interoperability and interchange ability
breaks the old-style dependence on proprietary methods, trade secrets, and single providers
builds a strong foundation on which others can quickly build and innovate
all of the mentioned
34. Task of Distributed Management Task Force is not ________
to promote interoperability among the management solution providers
to act as an interface between the various budding technologies and provide solution to manage various environments
to track the operation of the different management solution providers
to manage the facility by itself if one of the management solution providers fail
35. SMI-S Standard uses which of the following?
Java RMI
CIM-XML/HTTP
CORBA
.NET
36. The application-level protocol in which a few manager stations control a set of agents is called ______
HTML
TCP
SNMP
SNMP/IP
37. Full duplex mode increases the capacity of each domain by ________
10 to 20 mbps
20 to 30 mbps
30 to 40 mbps
40 to 50 mbps
38. Configuration management can be divided into which two subsystems?
Reconfiguration and documentation
Management and configuration
Documentation and dialing up
Configuration and dialing up
39. To use a Simple Network Management System, we need _______
Servers
IP
Protocols
Rules
40. The main difference between SNMPv3 and SNMPv2 is _______
Management
Integration
Classification
Enhanced security
41. In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________
Fault Management
Secured Management
Active Management
Security Management
42. BER stands for ________
Basic Encoding Rules
Basic Encoding Resolver
Basic Encoding Rotator
Basic Encoding Router
43. Control of the users’ access to network resources through charges is the main responsibility of ________
Reactive Fault Management
Reconfigured Fault Management
Accounting Management
Security Management
44. SNMP is the framework for managing devices in an internet using the ______
TCP/IP protocol
UDP
SMTP
None
45. Structure of Management Information (SMI), is the guideline of ________
HTTP
SNMP
URL
MIB
46. The application layer protocol used by a Telnet application is ________
Telnet
FTP
HTTP
SMTP
47. Which amongst the following statements is correct for “character at a time” mode?
Character processing is done on the local system under the control of the remote system
Most text typed is immediately sent to the remote host for processing
All text is echoed locally, only completed lines are sent to the remote host
All text is processed locally, and only confirmed lines are sent to the remote host
48. _______ allows you to connect and login to a remote computer
Telnet
FTP
HTTP
SMTP
49. What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?
telnet//www.sanfoundry.com
telnet:www.sanfoundry.com
telnet://www.sanfoundry.com
telnet www.sanfoundry.com
50. Telnet is used for _______
Television on net
Network of Telephones
Remote Login
Teleshopping site
Submit