Computer Networks MCQ Number 01554

Computer Networks MCQ Set 1

1. Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode

Answer

Answer: b [Reason:] ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.

2. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
a) Kerberos V5
b) Certificates
c) SHA
d) MD5

Answer

Answer: c, d [Reason:] SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.

3. Which two types of IPsec can be used to secure communications between two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) AH transport mode
d) ESP transport mode

Answer

Answer: a, b [Reason:] A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.

4. ______ provides authentication at the IP level.
a) AH
b) ESP
c) PGP
d) SSL

Answer

Answer: a [Reason:] It provides integrity checking and anti-reply security.

5. IPsec defines two protocols:_______ and ________
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) All of the mentioned

Answer

Answer: c [Reason:] Authentication header and Encryption security payload.

6. IP Security operates in which layer of the OSI model?
a) Network
b) Transport
c) Application
d) Physical

Answer

Answer: a [Reason:] Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.

7. ESP provides
a) source authentication
b) data integrity
c) privacy
d) all of the mentioned

Answer

Answer: d [Reason:] Encrypted security payload provides source, data integrity and privacy.

8. In computer security… means that computer system assets can be modified only by authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity

Answer

Answer: b [Reason:] Integrity means that computer system assets can be modified only by authorized parities.

9. In computer security… means that the information in a computer system only be accessible for reading by authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity

Answer

Answer: a [Reason:] Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.

10. Which of the following organizations is primarily concerned with military encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU

Answer

Answer: a [Reason:] The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.

Computer Networks MCQ Set 2

1. Frame Relay is very cheap than other
a) LANs
b) WANs
c) MANs
d) Multipoint Networks

Answer

Answer: b [Reason:] Frame Relay is very cheap than other WANs.

2. Frame Relay networks offer an option called
a) Voice Over For Relay
b) Voice Over Fine Relay
c) Voice On Frame Relay
d) Voice Over Frame Relay

Answer

Answer: d [Reason:] Frame Relay networks offer an option calledVoice Over Frame Relay

3. There are ________ total features of Frame Relay.
a) Five
b) Seven
c) Nine
d) Ten

Answer

Answer: c [Reason:] There are total features of Frame Relay are Nine.

4. Frame Relay does not provide flow or error control, they must be provided by the
a) Lower Level Protocol
b) High Level Protocol
c) Upper Level Protocol
d) Downward Level Protocol

Answer

Answer: c [Reason:] Frame Relay does not provide flow or error control, they must be provided by theUpper Level Protocol.

5. Frame Relay deploys physical layer carriers such as
a) ADMs
b) UPSR
c) BLSR
d) SONET

Answer

Answer: d [Reason:] Frame Relay deploys physical layer carriers such asSONET.

6. Frame relay has error detection at the
a) physical layer
b) data link layer
c) network layer
d) transport layer

Answer

Answer: b [Reason:] In data link layer error control header is the main thing for any packet transfer, so we use this layer frame relay has error detection.

7. Virtual circuit identifier in frame relay is called
a) data link connection identifier
b) frame relay identifier
c) cell relay identifier
d) none of the mentioned

Answer

Answer: a [Reason:] Virtual circuit identifier in frame relay is calleddata link connection identifier.

8. Frame relay has only
a) physical layer
b) data link layer
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: c [Reason:] Frame relay has only physical and data link layer for error detection in data link layer and for conversion in physical layer.

9. In frame relay networks, extended address is used
a) to increase the range of data link connection identifiers
b) for error detection
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: a [Reason:] In frame relay networks, extended address is usedto increase the range of data link connection identifiers.

10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) None of the mentioned

Answer

Answer: a [Reason:] FRAD stands for frame relay assembler/disassembler.

Computer Networks MCQ Set 3

1. Storage management comprises of
a) SAN Management
b) Data protection
c) Disk operation
d) All of the mentioned

Answer

Answer: d [Reason:] SAN, Data protection and Disk operation are the main things of storage management.

2. Identify the storage devices
a) Switch
b) RAID Arrays
c) Tape drives
d) All of the mentioned

Answer

Answer: d [Reason:] switch, RAID arrays and tape drives are main storage devices.

3. Which protocols are used for Storage management?
a) SNMP
b) LDAP
c) POP3
d) MIB

Answer

Answer: a [Reason:] Simple Network Management Protocol is for storage management.

4. Identify the difficulties the SAN administrator incur while dealing with diverse vendors
a) Proprietary management interfaces
b) Multiple applications to manage storage in the data center
c) No single view
d) All of the mentioned

Answer

Answer: d [Reason:] Proprietary management interfaces, multiple applications management and no single view are main difficulties.

5. How do Storage administrators ensure secure access to storage devices:
a) By using Zoning
b) By putting a physical lock on the storage device
c) By keeping devices shutdown when not in use
d) By keeping devices when used

Answer

Answer: a [Reason:] By using Zoning, Storage administrators ensure secure access to storage devices.

6. Effective Storage management includes
a) Securities
b) Backups
c) Reporting
d) All of the mentioned

Answer

Answer: d [Reason:] In storage management all necessities like security, backups and reporting facilities are included.

7. Identify the tasks involved in Storage Capacity management
a) Identifying storage systems are approaching full capacity
b) Monitoring trends for each resource
c) Tracking Total capacity, total used, total available
d) All of the mentioned

Answer

Answer: d [Reason:] Identifying, Monitoring and Tracking are main tasks involved in SCM.

8. Effect of open standards like SMI(s)
a) Standardization drives software interoperability and interchange ability
b) Breaks the old-style dependence on proprietary methods, trade secrets, and single providers
c) Builds a strong foundation on which others can quickly build and innovate
d) All of the mentioned

Answer

Answer: d [Reason:] Driver software, old style dependence and strong foundation.

9. Task of Distributed Management Task Force is to
a) To promote interoperability among the management solution providers
b Acts as an interface between the various budding technologies and provide solution to manage various environments
c) Only (a)
d) Both (a) and (b)

Answer

Answer: d [Reason:] Promote interoperability and interface between various buildings.

10. SMI-S Standard uses
a) Java RMI
b) CIM-XML/HTTP
c) CORBA
d) .NET

Answer

Answer: b [Reason:] CIM-XML/HTTP is a SMI-S standard.

Computer Networks MCQ Set 4

1. Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) nonpersistent HTTP
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: a [Reason:] None.

2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) none of the mentioned

Answer

Answer: a [Reason:] None.

3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) none of the mentioned

Answer

Answer: a [Reason:] None.

4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned

Answer

Answer: b [Reason:] None.

5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned

Answer

Answer: a [Reason:] None.

6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23

Answer

Answer: b [Reason:] None.

7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol

Answer

Answer: a [Reason:] None.

8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: b [Reason:] None.

9. The file transfer protocol is built on
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) none of the mentioned

Answer

Answer: c [Reason:] None.

10. In file transfer protocol, data transfer can be done in
a) stream mode
b) block mode
c) compressed mode
d) all of the mentioned

Answer

Answer: d [Reason:] None.

Computer Networks MCQ Set 5

1. Internet Control Message Protocol(ICMP) has designed to compensate
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned

Answer

Answer: d [Reason:] ICMP has been designed to address these issues.

2. Header size of the ICMP message is
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits

Answer

Answer: a [Reason:] ICMP message has 8-bytes header and variable size data section.

3. During error reporting, ICMP always reports error messages to
a) Destination
b) Source
c) Next router
d) Previous router

Answer

Answer: b [Reason:] ICMP sends error message to the source because the datagram knows information about source and destination IP address.

4. Which of these is not a type of error-reporting messages
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded

Answer

Answer: c [Reason:] Router error is not a type of error-reporting messages in ICMP.

5. ICMP error message will not be generated for a datagram having a special address such as
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127

Answer

Answer: a [Reason:] No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.

6. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded

Answer

Answer: a [Reason:] Router sends destination unreachable message if the destination is not found.

7. The source-quench message in ICMP was designed to add a kind of ____________ to the IP.
a) Error control
b) Flow control
c) Router control
d) None of the mentioned

Answer

Answer: b [Reason:] Firstly, it informs the source that the datagram has been discarded. secondly, it warns the source that there is congestion in the network.

8. In case of time exceeded error, when the datagram visits a router, the value of time to live field is
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1

Answer

Answer: d [Reason:] This field will be decremented by 1 at every router, and will be zero by the time it reaches source.

9. Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source

Answer

Answer: b [Reason:] Router sends destination unreachable message if the destination is not found.

10. During debugging, we can use the ____________ program to find if a host is alive and responding
a) Traceroute
b) Shell
c) Ping
d) Java

Answer

Answer: c [Reason:] Ping program is used to find if a host is alive and responding.

11. In windows, ____________ can be used to trace the route of the packet from the source to the destination
a) Traceroute
b) Tracert
c) Ping
d) Locater

Answer

Answer: b [Reason:] Tracert is used in case of windows, whereas Traceroute in UNIX.

12. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011

Answer

Answer: a [Reason:] Checksum is the compliment of the sum(exchange 0’s and 1’s).

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.