Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Last Answer : A) Tunnel
Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above
Last Answer : D) All of the above
Description : Which are the two modes of IP security? (A) Transport and Certificate (B) Transport and Tunnel (C) Certificate and Tunnel (D) Preshared and Transport
Last Answer : (B) Transport and Tunnel
Description : …………….. mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway
Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL
Last Answer : C. ESP
Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer
Last Answer : B) Session Layer
Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) Application
Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network
Last Answer : Answer: Marks to all
Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP
Last Answer : Answer: 1
Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway
Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit
Last Answer : C. 8-bit
Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov
Last Answer : baseheader;upper-layer data
Description : In IPv6, options are inserted between the _________ and the ___________ data A. base header; extension header B. base header; upper-layer data C. base header; frame header D. none of the above
Last Answer : B. base header; upper-layer data
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : A) SSL handshake protocol
Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : C) SSL record protocol
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation
Last Answer : A) Encryption
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack is popped five times and each element is inserted into a queue. Two elements are deleted from the queue and pushed ... The popped item is ................... (1) A (2) B (3) F (4) G
Last Answer : Answer: 2
Description : A 45-year-old solicitor had an onset of severe, crushing, substernal chest pain while attending a football match. He collapsed on his way to the car. Bystander Cardiorespiratory Resuscitation ... His oxyhemoglobin curve is shifted to the left 5) His pulmonary artery pressure is probably elevated
Last Answer : Answers-5 This young patient with severe central chest pain has probably arrested due to myocardial infarction and arrhythmia. His gases reveal high PO2 following 100% O2 but severe acidosis ... no left to right shunting and high pulmonary pressures would be expected after this arrest scenario.
Description : Match the following. a) Java 1) is a tool for debugging java program b) Javah 2) is a tool for creating C-like header files c) Javap 3) runs java bytecode d) jdb 4) prints java code representation A) a-3, b-2,c-1 B) a-3, b-1, c-4, d-2 C) a-1, b-2, c-3, d-4 D) a-2, b-1, c-3, d-4
Last Answer : B) a-3, b-1, c-4, d-2
Description : The jdb is used to A) Create a jar archive B) Debug a java program C) Create C header file D) Generate java documentation
Last Answer : B) Debug a java program
Description : Which of the following is true about Java. A) Java does not support overloading. B) Java has replaced the destructor function of C++ C) There are no header files in Java. D) All of the above.
Description : Which of the following cannot be passed to a function? A) Reference variable B) Arrays C) Class objects D) Header files
Last Answer : D) Header files
Description : There is an extra element at the head of the list called a ………. A) Antinel B) Sentinel C) List header D) List head
Last Answer : B) Sentinel
Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum
Last Answer : (A) identification
Description : Which of the following control fields in TCP header is used to specify the sender has no more data to transmit? (A) FIN (B) RST (C) SYN (D) PSH
Last Answer : (A) FIN
Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes
Last Answer : (4) 5 bytes
Description : The maximum size of the data that the application layer can pass on to the TCP layer below is ......... (1) 216 bytes (2) 216 bytes + TCP header length (3) 216 bytes - TCP header length (4) 215 bytes
Description : Which of the following cannot be passed to a function in C++? (1) Constant (2) Structure (3) Array (4) Header file
Last Answer : Answer: 4
Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC
Last Answer : DDCMP does not need special hardware to final the beginning of a message
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : hedestination IP address in the datagram header
Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length
Last Answer : b. Source address
Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number
Last Answer : d. Destination port number
Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13
Last Answer : d. 13
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : State which statement is true for Suspended process? i) The process is not immediately available for execution. ii) The process may be removed from suspended state automatically without removal order. A) i only B) ii only C) i and ii only D) None
Last Answer : A) i only
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation
Last Answer : B) Static allocation
Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : The combination of ……………. And ………….. is often termed the local address of the local portion of the IP address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number D) All of the above
Last Answer : C) Subnet number and host number