…………….. mode is used whenever either end of a security association is gateway. A) Tunnel
B) Encapsulating
C) Transport
D) Gateway

1 Answer

Answer :

A) Tunnel

Related questions

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : D) Both A and B

Description : Which are the two modes of IP security? (A) Transport and Certificate (B) Transport and Tunnel (C) Certificate and Tunnel (D) Preshared and Transport

Last Answer :  (B) Transport and Tunnel 

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : A CPU handles interrupt by executing interrupt service subroutine................. (A) by checking interrupt register after execution of each instruction (B) by checking interrupt register ... cycle (C) whenever an interrupt is registered (D) by checking interrupt register at regular time interval

Last Answer : (A) by checking interrupt register after execution of each instruction

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : ............ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified. A) Procedure B) Trigger C) Curser D) None of the above

Last Answer : B) Trigger

Description : How would you maintain good association with such a colleague who is clear in heart but very aggressive in behaviour? Options: A) You restrict your personal relations B) You maintain relations ... tell him his mistakes politely C) You snap your relations D) You maintain personalized relations

Last Answer : B) You maintain relations but whenever he cools down, tell him his mistakes politely

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as (A) Association (B) Aggregation (C) Encapsulation (D) Generalisation

Last Answer : (B) Aggregation

Description : Which of the following services is not provided by wireless access point in 802.11 WLAN? (A) Association (B) Disassociation (C) Error Correction (D) Integration

Last Answer : Answer: C Explanation: IEEE 802.11 Services

Description : Which of the following statements is correct? (A) Aggregation is a strong type of association between two classes with full ownership. (B) Aggregation is a strong type of association between two ... ownership. (D) Aggregation is a weak type of association between two classes with full ownership.

Last Answer : (C) Aggregation is a weak type of association between two classes with partial ownership.

Description : Discovery of cross sales opportunities is called as ............... (A) Association (B) Visualization (C) Correlation (D) Segmentation 

Last Answer : (A) Association

Description : In IT networking, which of the following device is used in physical layer? (1) Repeater (2) Router (3) Transport Gateway (4) Bridge

Last Answer : Repeater

Description : My HN199D (Hanns-G) monitor keeps turning on and off whenever I move the mouse to come out of sleep mode. It eventually starts working after five minutes of turning on and off. Help?

Last Answer : Hmm, my brother has the same issue, next time I talk to him I’ll see if he knows what’s up. Different monitor, same problem.

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Whenever it is provided by this Act that the Court may presume a fact, it may either  regard such fact as proved, unless and until it is disproved, or may call for proof of it a) May presume b) Conclusive proof c) Shall presume d) None of these

Last Answer : a) May presume

Description : If an article issued by RLO either for deliver to the addressees or to return to the sender cannot be delivered a) It may be redirected whenever the revised address of the addressee/sender is not known the ... returned to RLO c) It should be burnt d) It should be sent to the HPO for safe custody

Last Answer : a) It may be redirected whenever the revised address of the addressee/sender is not known the PO

Description : The Inspector should, whenever he meets a village postman out in his beat or at the office to which he is attached, examine a) His bag to see whether he carries postage stamps, forms, etc., b) His ... counterfoils of receipts for articles registered by him. c) Both the A and B d) Either A or B

Last Answer : c) Both the A and B

Description : Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? A. chmod u+x emp[l-3] B. chmod 777 emp* C. chmod u+r ??? emp D. chmod 222 emp? E. None of the above

Last Answer : A. chmod u+x emp[l-3]

Description : …………… are very effective because a mode switch is not required to switch from one thread to another. A) Kernel-level threads B) User-level threads C) Alterable threads D) Application level threads

Last Answer : B) User-level threads

Description : In the ………………… mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access

Last Answer : B) Random access

Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct? (A) T1 < T2 (B) T1 > T2 (C) T1 = T2 (D) Nothing can be said about the relation between T1 and T2.

Last Answer : (A) T1 < T2

Description : Which one of the following is not an addressing mode? (A) Register indirect (B) Auto increment (C) Relative indexed (D) Immediate operand

Last Answer : (C) Relative indexed

Description : Which of the following is/are the fundamental semantic model(s) of parameter passing? (A) in mode (B) out mode (C) in-out mode (D) all of the above

Last Answer : (D) all of the above

Description : The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two’s complement overflow output is given as

Last Answer : (B) 218 × 10

Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Description : The ............... addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction. (A) Base indexed (B) Base indexed plus displacement (C) Indexed (D) Displacement

Last Answer : (D) Displacement

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : Governmental regulations can affect the viability & ----------- of a company using the internet as a foreign market entry mode. A. effectiveness B. association C. performance D. None of the above

Last Answer : effectiveness

Description : Their are three gaurds and three prisoners who need to cross a river. Their boat only holds two people at a time, and the number of prisoners must NEVER be allowed to outnumber the number of gaurds on ... made and who is in the boat and who is on each of the riverbanks during each trip. -Riddles

Last Answer : Inless some one can tell me a way that 2 prisoners, at some point, don't out number the guards whether they are just dropping off and still in the boat or actually on land (because even if ... to be impossible. Please let me know an alternative if you figure one out because i'm stumped. thanks

Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport

Last Answer : B) Mac sub layer

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : The ............ layer change bits onto electromagnetic signals. A) Physical B) Transport C) Data Link D) Presentation

Last Answer : A) Physical

Description : SMTP stands for A) Simple Mail Transfer Protocol B) Simple Mail Transport Protocol C) Sample Mail Transfer Protocol D) Sample Mail Transport Protocol

Last Answer : A) Simple Mail Transfer Protocol

Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport

Last Answer : (A) Transport, Session, Presentation, Application