Computer Networks MCQ Set 1
1. Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
Answer
Answer: b [Reason:] ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.
2. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
a) Kerberos V5
b) Certificates
c) SHA
d) MD5
Answer
Answer: c, d [Reason:] SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
3. Which two types of IPsec can be used to secure communications between two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) AH transport mode
d) ESP transport mode
Answer
Answer: a, b [Reason:] A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.
4. ______ provides authentication at the IP level.
a) AH
b) ESP
c) PGP
d) SSL
Answer
Answer: a [Reason:] It provides integrity checking and anti-reply security.
5. IPsec defines two protocols:_______ and ________
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) All of the mentioned
Answer
Answer: c [Reason:] Authentication header and Encryption security payload.
6. IP Security operates in which layer of the OSI model?
a) Network
b) Transport
c) Application
d) Physical
Answer
Answer: a [Reason:] Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.
7. ESP provides
a) source authentication
b) data integrity
c) privacy
d) all of the mentioned
Answer
Answer: d [Reason:] Encrypted security payload provides source, data integrity and privacy.
8. In computer security… means that computer system assets can be modified only by authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
Answer
Answer: b [Reason:] Integrity means that computer system assets can be modified only by authorized parities.
9. In computer security… means that the information in a computer system only be accessible for reading by authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
Answer
Answer: a [Reason:] Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.
10. Which of the following organizations is primarily concerned with military encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU
Answer
Answer: a [Reason:] The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.
Computer Networks MCQ Set 2
1. Frame Relay is very cheap than other
a) LANs
b) WANs
c) MANs
d) Multipoint Networks
Answer
Answer: b [Reason:] Frame Relay is very cheap than other WANs.
2. Frame Relay networks offer an option called
a) Voice Over For Relay
b) Voice Over Fine Relay
c) Voice On Frame Relay
d) Voice Over Frame Relay
Answer
Answer: d [Reason:] Frame Relay networks offer an option calledVoice Over Frame Relay
3. There are ________ total features of Frame Relay.
a) Five
b) Seven
c) Nine
d) Ten
Answer
Answer: c [Reason:] There are total features of Frame Relay are Nine.
4. Frame Relay does not provide flow or error control, they must be provided by the
a) Lower Level Protocol
b) High Level Protocol
c) Upper Level Protocol
d) Downward Level Protocol
Answer
Answer: c [Reason:] Frame Relay does not provide flow or error control, they must be provided by theUpper Level Protocol.
5. Frame Relay deploys physical layer carriers such as
a) ADMs
b) UPSR
c) BLSR
d) SONET
Answer
Answer: d [Reason:] Frame Relay deploys physical layer carriers such asSONET.
6. Frame relay has error detection at the
a) physical layer
b) data link layer
c) network layer
d) transport layer
Answer
Answer: b [Reason:] In data link layer error control header is the main thing for any packet transfer, so we use this layer frame relay has error detection.
7. Virtual circuit identifier in frame relay is called
a) data link connection identifier
b) frame relay identifier
c) cell relay identifier
d) none of the mentioned
Answer
Answer: a [Reason:] Virtual circuit identifier in frame relay is calleddata link connection identifier.
8. Frame relay has only
a) physical layer
b) data link layer
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: c [Reason:] Frame relay has only physical and data link layer for error detection in data link layer and for conversion in physical layer.
9. In frame relay networks, extended address is used
a) to increase the range of data link connection identifiers
b) for error detection
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: a [Reason:] In frame relay networks, extended address is usedto increase the range of data link connection identifiers.
10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) None of the mentioned
Answer
Answer: a [Reason:] FRAD stands for frame relay assembler/disassembler.
Computer Networks MCQ Set 3
1. Storage management comprises of
a) SAN Management
b) Data protection
c) Disk operation
d) All of the mentioned
Answer
Answer: d [Reason:] SAN, Data protection and Disk operation are the main things of storage management.
2. Identify the storage devices
a) Switch
b) RAID Arrays
c) Tape drives
d) All of the mentioned
Answer
Answer: d [Reason:] switch, RAID arrays and tape drives are main storage devices.
3. Which protocols are used for Storage management?
a) SNMP
b) LDAP
c) POP3
d) MIB
Answer
Answer: a [Reason:] Simple Network Management Protocol is for storage management.
4. Identify the difficulties the SAN administrator incur while dealing with diverse vendors
a) Proprietary management interfaces
b) Multiple applications to manage storage in the data center
c) No single view
d) All of the mentioned
Answer
Answer: d [Reason:] Proprietary management interfaces, multiple applications management and no single view are main difficulties.
5. How do Storage administrators ensure secure access to storage devices:
a) By using Zoning
b) By putting a physical lock on the storage device
c) By keeping devices shutdown when not in use
d) By keeping devices when used
Answer
Answer: a [Reason:] By using Zoning, Storage administrators ensure secure access to storage devices.
6. Effective Storage management includes
a) Securities
b) Backups
c) Reporting
d) All of the mentioned
Answer
Answer: d [Reason:] In storage management all necessities like security, backups and reporting facilities are included.
7. Identify the tasks involved in Storage Capacity management
a) Identifying storage systems are approaching full capacity
b) Monitoring trends for each resource
c) Tracking Total capacity, total used, total available
d) All of the mentioned
Answer
Answer: d [Reason:] Identifying, Monitoring and Tracking are main tasks involved in SCM.
8. Effect of open standards like SMI(s)
a) Standardization drives software interoperability and interchange ability
b) Breaks the old-style dependence on proprietary methods, trade secrets, and single providers
c) Builds a strong foundation on which others can quickly build and innovate
d) All of the mentioned
Answer
Answer: d [Reason:] Driver software, old style dependence and strong foundation.
9. Task of Distributed Management Task Force is to
a) To promote interoperability among the management solution providers
b Acts as an interface between the various budding technologies and provide solution to manage various environments
c) Only (a)
d) Both (a) and (b)
Answer
Answer: d [Reason:] Promote interoperability and interface between various buildings.
10. SMI-S Standard uses
a) Java RMI
b) CIM-XML/HTTP
c) CORBA
d) .NET
Answer
Answer: b [Reason:] CIM-XML/HTTP is a SMI-S standard.
Computer Networks MCQ Set 4
1. Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) nonpersistent HTTP
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: a [Reason:] None.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) none of the mentioned
Answer
Answer: a [Reason:] None.
3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) none of the mentioned
Answer
Answer: a [Reason:] None.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned
Answer
Answer: b [Reason:] None.
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
Answer
Answer: a [Reason:] None.
6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
Answer
Answer: b [Reason:] None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
Answer
Answer: a [Reason:] None.
8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: b [Reason:] None.
9. The file transfer protocol is built on
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) none of the mentioned
Answer
Answer: c [Reason:] None.
10. In file transfer protocol, data transfer can be done in
a) stream mode
b) block mode
c) compressed mode
d) all of the mentioned
Answer
Answer: d [Reason:] None.
Computer Networks MCQ Set 5
1. Internet Control Message Protocol(ICMP) has designed to compensate
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
Answer
Answer: d [Reason:] ICMP has been designed to address these issues.
2. Header size of the ICMP message is
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits
Answer
Answer: a [Reason:] ICMP message has 8-bytes header and variable size data section.
3. During error reporting, ICMP always reports error messages to
a) Destination
b) Source
c) Next router
d) Previous router
Answer
Answer: b [Reason:] ICMP sends error message to the source because the datagram knows information about source and destination IP address.
4. Which of these is not a type of error-reporting messages
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer
Answer: c [Reason:] Router error is not a type of error-reporting messages in ICMP.
5. ICMP error message will not be generated for a datagram having a special address such as
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
Answer
Answer: a [Reason:] No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
6. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer
Answer: a [Reason:] Router sends destination unreachable message if the destination is not found.
7. The source-quench message in ICMP was designed to add a kind of ____________ to the IP.
a) Error control
b) Flow control
c) Router control
d) None of the mentioned
Answer
Answer: b [Reason:] Firstly, it informs the source that the datagram has been discarded. secondly, it warns the source that there is congestion in the network.
8. In case of time exceeded error, when the datagram visits a router, the value of time to live field is
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
Answer
Answer: d [Reason:] This field will be decremented by 1 at every router, and will be zero by the time it reaches source.
9. Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
Answer
Answer: b [Reason:] Router sends destination unreachable message if the destination is not found.
10. During debugging, we can use the ____________ program to find if a host is alive and responding
a) Traceroute
b) Shell
c) Ping
d) Java
Answer
Answer: c [Reason:] Ping program is used to find if a host is alive and responding.
11. In windows, ____________ can be used to trace the route of the packet from the source to the destination
a) Traceroute
b) Tracert
c) Ping
d) Locater
Answer
Answer: b [Reason:] Tracert is used in case of windows, whereas Traceroute in UNIX.
12. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
Answer
Answer: a [Reason:] Checksum is the compliment of the sum(exchange 0’s and 1’s).