Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC
Last Answer : a) RFC
Description : This is a global collection of high-powered computer that are connected together with cables, telephone lines, microwave dishes, satellites etc. A) Arpanet B) Internet C) Network
Last Answer : B) Internet
Description : Which of the following protocol is not an Internet Engineering Task Force standard? a) SIP b) SIMPLE c) XMPP d) IMPS
Last Answer : IMPS
Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm
Last Answer : (A) Flow Control Policy
Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes
Last Answer : (4) 5 bytes
Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway
Last Answer : Answer: 4
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only
Last Answer : D) All i, ii, iii, iv and v only
Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : ____________ protocols provide end to end message transfer capability independent of the underlying network. A. Network layer B. Transport layer C. Application layer D. Link layer
Last Answer : B. Transport layer
Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP
Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony
Last Answer : c) Call diversion
Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : D) Internet Control Message Protocol (ICMP)
Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above
Last Answer : link local
Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : b. i, ii, iii
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe
Last Answer : A) FTP
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? (A) Session Maintenance Protocol (B) Real - time Streaming Protocol (C) Real - time Transport Control Protocol (D) Session Initiation Protocol
Last Answer : (D) Session Initiation Protocol
Description : In electronic mail, which of the following protocols allows the transfer of multimedia messages? (A) IMAP (B) SMTP (C) POP 3 (D) MIME
Last Answer : (D) MIME
Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine? (A) POP3 (B) IMAP (C) SMTP (D) DMSP
Last Answer : (B) IMAP
Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP
Last Answer : Answer: 1
Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect
Last Answer : c.ping
Description : Which one of the following is not a key process area in CMM level 5 ? (A) Defect prevention (B) Process change management (C) Software product engineering (D) Technology change management
Last Answer : (C) Software product engineering
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v
Last Answer : C) i, ii, iii and v only
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching
Last Answer : (D) Circuit Switching
Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length
Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer
Last Answer : d. Application layer
Description : What are the common protocols associated with the network layer? a. Address Resolution Protocol b. Reverse Address Resolution Protocol c. Internet protocol d. Neighbour Discovery Protocol
Last Answer : c. Internet protocol
Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : B. 1. true, 2. false, 3.true
Description : Checksum is used in Internet by several protocols although not at the _________ a) Session layer b) Transport layer c) Network layer d) Data link layer
Last Answer : d) Data link layer
Description : Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Last Answer : OSI Layers Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. Data link layer: in charge of data encapsulation ... mails. -SNMP (Simple Network Management Protocol) allows the management of the network.
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : Which of the following is based on the IETF Session Initiation Protocol? a) WSDL b) SIMPLE c) SOAP d) All of the mentioned
Last Answer : SIMPLE
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above
Last Answer : d. All the above
Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above
Last Answer : D) All of the above
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption