Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol
Last Answer : A) SSL handshake protocol
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP
Last Answer : c. TCP
Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP
Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b
Last Answer : A. firewall
Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above
Last Answer : D) All of the above
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP
Last Answer : Answer: 1
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D
Last Answer : a. A & B
Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : C) SSL record protocol
Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification
Last Answer : A. encryption, authentication.
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP
Last Answer : c. UDP, TCP, UDP and TCP
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP
Last Answer : c. TCP and UDP
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : D. 1.false, 2. true, 3. true
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP
Last Answer : C. TCP and UDP
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP
Last Answer : c) TCP and UDP
Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation
Last Answer : d. presentation
Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length
Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above
Last Answer : protecting data indata communication systems
Description : The size limit for datagrams in UDP is A) 128 B) 16 C) 64 D) 4
Last Answer : The size limit for datagrams in UDP is 16
Description : An IGMP packet is carried in an __________ packet. A) UDP B) IP C) Ethernet frame D) noneof the above
Last Answer : IP
Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
Last Answer : UDP
Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer
Last Answer : b. Session Layer
Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) Application
Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer
Last Answer : a.Application layer
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : .In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a. Application layer b. Transport layer c. Link layer d. Session layer
Last Answer : a. Application layer
Description : TCP/IP layer is equivalent to combined Session, Presentation and a. Transport layer b. Network layer c. Application layer d. Physical layer
Last Answer : c. Application layer
Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application
Last Answer : b. Host to host
Description : What does SSL stands for ? System socket layer Secure system login Secure socket layer Secure system login
Last Answer : Secure socket layer
Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Last Answer : A) Tunnel