Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway
Last Answer : A) Tunnel
Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above
Last Answer : D) All of the above
Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Last Answer : D) Both A and B
Description : Which are the two modes of IP security? (A) Transport and Certificate (B) Transport and Tunnel (C) Certificate and Tunnel (D) Preshared and Transport
Last Answer : (B) Transport and Tunnel
Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Description : A CPU handles interrupt by executing interrupt service subroutine................. (A) by checking interrupt register after execution of each instruction (B) by checking interrupt register ... cycle (C) whenever an interrupt is registered (D) by checking interrupt register at regular time interval
Last Answer : (A) by checking interrupt register after execution of each instruction
Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False
Last Answer : A) True, False
Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii
Last Answer : B) i, and ii only
Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway
Last Answer : D) Gateway
Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway
Last Answer : Answer: 4
Description : ............ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified. A) Procedure B) Trigger C) Curser D) None of the above
Last Answer : B) Trigger
Description : Which of the following statement(s) is/are false? (a) A connected multigraph has an Euler Circuit if and only if each of its vertices has even degree. (b) A connected multigraph has an Euler Path but not an Euler Circuit if and only ... Codes: (A) (a) only (B) (b) and (c) (C) (c) only (D) (d) only
Last Answer : (D) (d) only
Description : How would you maintain good association with such a colleague who is clear in heart but very aggressive in behaviour? Options: A) You restrict your personal relations B) You maintain relations ... tell him his mistakes politely C) You snap your relations D) You maintain personalized relations
Last Answer : B) You maintain relations but whenever he cools down, tell him his mistakes politely
Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables
Last Answer : B) End to end delivery
Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application
Last Answer : (C) Transport
Description : The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as (A) Association (B) Aggregation (C) Encapsulation (D) Generalisation
Last Answer : (B) Aggregation
Description : Which of the following services is not provided by wireless access point in 802.11 WLAN? (A) Association (B) Disassociation (C) Error Correction (D) Integration
Last Answer : Answer: C Explanation: IEEE 802.11 Services
Description : Which of the following statements is correct? (A) Aggregation is a strong type of association between two classes with full ownership. (B) Aggregation is a strong type of association between two ... ownership. (D) Aggregation is a weak type of association between two classes with full ownership.
Last Answer : (C) Aggregation is a weak type of association between two classes with partial ownership.
Description : Discovery of cross sales opportunities is called as ............... (A) Association (B) Visualization (C) Correlation (D) Segmentation
Last Answer : (A) Association
Description : In IT networking, which of the following device is used in physical layer? (1) Repeater (2) Router (3) Transport Gateway (4) Bridge
Last Answer : Repeater
Description : My HN199D (Hanns-G) monitor keeps turning on and off whenever I move the mouse to come out of sleep mode. It eventually starts working after five minutes of turning on and off. Help?
Last Answer : Hmm, my brother has the same issue, next time I talk to him I’ll see if he knows what’s up. Different monitor, same problem.
Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : b. i, ii, iii
Description : Whenever it is provided by this Act that the Court may presume a fact, it may either regard such fact as proved, unless and until it is disproved, or may call for proof of it a) May presume b) Conclusive proof c) Shall presume d) None of these
Last Answer : a) May presume
Description : If an article issued by RLO either for deliver to the addressees or to return to the sender cannot be delivered a) It may be redirected whenever the revised address of the addressee/sender is not known the ... returned to RLO c) It should be burnt d) It should be sent to the HPO for safe custody
Last Answer : a) It may be redirected whenever the revised address of the addressee/sender is not known the PO
Description : The Inspector should, whenever he meets a village postman out in his beat or at the office to which he is attached, examine a) His bag to see whether he carries postage stamps, forms, etc., b) His ... counterfoils of receipts for articles registered by him. c) Both the A and B d) Either A or B
Last Answer : c) Both the A and B
Description : Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? A. chmod u+x emp[l-3] B. chmod 777 emp* C. chmod u+r ??? emp D. chmod 222 emp? E. None of the above
Last Answer : A. chmod u+x emp[l-3]
Description : …………… are very effective because a mode switch is not required to switch from one thread to another. A) Kernel-level threads B) User-level threads C) Alterable threads D) Application level threads
Last Answer : B) User-level threads
Description : In the ………………… mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access
Last Answer : B) Random access
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : C) ii, iii and iv only
Description : Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct? (A) T1 < T2 (B) T1 > T2 (C) T1 = T2 (D) Nothing can be said about the relation between T1 and T2.
Last Answer : (A) T1 < T2
Description : Which one of the following is not an addressing mode? (A) Register indirect (B) Auto increment (C) Relative indexed (D) Immediate operand
Last Answer : (C) Relative indexed
Description : Which of the following is/are the fundamental semantic model(s) of parameter passing? (A) in mode (B) out mode (C) in-out mode (D) all of the above
Last Answer : (D) all of the above
Description : The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two’s complement overflow output is given as
Last Answer : (B) 218 × 10
Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.
Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : The ............... addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction. (A) Base indexed (B) Base indexed plus displacement (C) Indexed (D) Displacement
Last Answer : (D) Displacement
Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.
Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.
Description : Governmental regulations can affect the viability & ----------- of a company using the internet as a foreign market entry mode. A. effectiveness B. association C. performance D. None of the above
Last Answer : effectiveness
Description : Their are three gaurds and three prisoners who need to cross a river. Their boat only holds two people at a time, and the number of prisoners must NEVER be allowed to outnumber the number of gaurds on ... made and who is in the boat and who is on each of the riverbanks during each trip. -Riddles
Last Answer : Inless some one can tell me a way that 2 prisoners, at some point, don't out number the guards whether they are just dropping off and still in the boat or actually on land (because even if ... to be impossible. Please let me know an alternative if you figure one out because i'm stumped. thanks
Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport
Last Answer : B) Mac sub layer
Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer
Last Answer : B) Session Layer
Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) Application
Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer
Last Answer : C) Session Layer
Description : The ............ layer change bits onto electromagnetic signals. A) Physical B) Transport C) Data Link D) Presentation
Description : SMTP stands for A) Simple Mail Transfer Protocol B) Simple Mail Transport Protocol C) Sample Mail Transfer Protocol D) Sample Mail Transport Protocol
Last Answer : A) Simple Mail Transfer Protocol
Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport
Last Answer : (A) Transport, Session, Presentation, Application