MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 6

Choose a topic to test your knowledge and improve your MCA skills

1. The DHCP server can provide the _______ of the IP addresses.




2. DHCP client and servers on the same subnet communicate via _________




3. After obtaining the IP address, to prevent the IP conflict the client may use ____




4. What is DHCP snooping?




5. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.




6. IPSec is designed to provide security at the _______




7. In tunnel mode, IPSec protects the ______




8. Which component is included in IP security?




9. WPA2 is used for security in _______




10. An attempt to make a computer resource unavailable to its intended users is called ______




11. Extensible authentication protocol is authentication framework frequently used in ______




12. Pretty good privacy (PGP) is used in ______




13. PGP encrypts data by using a block cipher called ______




14. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________




15. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.




16. When were VPNs introduced into the commercial world?




17. What protocol is NOT used in the operation of a VPN?




18. Which of the following statements is NOT true concerning VPNs?




19. Traffic in a VPN is NOT _______




20. VPNs are financially speaking ______




21. Which layer 3 protocols can be transmitted over an L2TP VPN?




22. ESP (Encapsulating Security Protocol) is defined in which of the following standards?




23. L2F was developed by which company?




24. Which layer of the OSI reference model does PPTP work at?




25. Which layer of the OSI reference model does IPsec work at?




26. Storage management comprises of ________




27. Which of the following is not a storage device?




28. Which protocols are used for Storage management?




29. Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.




30. How do Storage administrators ensure secure access to storage devices?




31. Effective Storage management does not include ____




32. Among the following, identify which task is not involved in Storage Capacity management?




33. Effect of open standards like SMI(s) is _________




34. Task of Distributed Management Task Force is not ________




35. SMI-S Standard uses which of the following?




36. The application-level protocol in which a few manager stations control a set of agents is called ______




37. Full duplex mode increases the capacity of each domain by ________




38. Configuration management can be divided into which two subsystems?




39. To use a Simple Network Management System, we need _______




40. The main difference between SNMPv3 and SNMPv2 is _______




41. In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________




42. BER stands for ________




43. Control of the users’ access to network resources through charges is the main responsibility of ________




44. SNMP is the framework for managing devices in an internet using the ______




45. Structure of Management Information (SMI), is the guideline of ________




46. The application layer protocol used by a Telnet application is ________




47. Which amongst the following statements is correct for “character at a time” mode?




48. _______ allows you to connect and login to a remote computer




49. What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?




50. Telnet is used for _______