

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
151. |
Internet access by transmitting digital data over the wires of a local telephone network is provided by |
A. | leased line |
B. | digital subscriber line |
C. | digital signal line |
D. | none of the mentioned |
Answer» B. digital subscriber line |
152. |
ISP exchanges internet traffic between their networks by |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | none of the mentioned |
Answer» A. internet exchange point |
153. |
Which one of the following protocol is not used in internet? |
A. | http |
B. | dhcp |
C. | dns |
D. | none of the mentioned |
Answer» D. none of the mentioned |
154. |
IPv6 addressed have a size of |
A. | 32 bits |
B. | 64 bits |
C. | 128 bits |
D. | 265 bits |
Answer» C. 128 bits |
155. |
Internet works on |
A. | packet switching |
B. | circuit switching |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. packet switching |
156. |
Which one of the following is not an application layer protocol used in internet? |
A. | remote procedure call |
B. | internet relay chat |
C. | resource reservation protocol |
D. | none of the mentioned |
Answer» C. resource reservation protocol |
157. |
Which protocol assigns IP address to the client connected in the internet? |
A. | dhcp |
B. | ip |
C. | rpc |
D. | none of the mentioned |
Answer» A. dhcp |
158. |
Which one of the following is not used in media access control? |
A. | ethernet |
B. | digital subscriber line |
C. | fiber distributed data interface |
D. | none of the mentioned |
Answer» D. none of the mentioned |
159. |
In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. algorithm for performing encryption and decryption |
160. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
161. |
Which one of the following algorithm is not used in asymmetric key cryptography? |
A. | rsa algorithm |
B. | diffie-hellman algorithm |
C. | electronic code book algorithm |
D. | none of the mentioned |
Answer» C. electronic code book algorithm |
162. |
In cryptography, the order of the letters in a message is rearranged by |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. transpositional ciphers |
163. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | none of the mentioned |
Answer» A. block cipher |
164. |
Cryptanalysis is used |
A. | to find some insecurity in a cryptographic scheme |
B. | to increase the speed |
C. | to encrypt the data |
D. | none of the mentioned |
Answer» A. to find some insecurity in a cryptographic scheme |
165. |
Which one of the following is a cryptographic protocol used to secure HTTP connection? |
A. | stream control transmission protocol (sctp) |
B. | transport layer security (tsl) |
C. | explicit congestion notification (ecn) |
D. | resource reservation protocol |
Answer» B. transport layer security (tsl) |
166. |
Voice privacy in GSM cellular telephone protocol is provided by |
A. | a5/2 cipher |
B. | b5/4 cipher |
C. | b5/6 cipher |
D. | b5/8 cipher |
Answer» A. a5/2 cipher |
167. |
ElGamal encryption system is |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | none of the mentioned |
Answer» B. asymmetric key encryption algorithm |
168. |
Cryptographic hash function takes an arbitrary block of data and returns |
A. | fixed size bit string |
B. | variable size bit string |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. fixed size bit string |
169. |
The attackers a network of compromised devices known as |
A. | internet |
B. | botnet |
C. | telnet |
D. | d-net |
Answer» B. botnet |
170. |
Which of the following is a form of DoS attack ? |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» D. all of the mentioned |
171. |
The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» C. connection flooding |
172. |
The DoS attack is which the attacker sends deluge of packets to the targeted host |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» B. bandwidth flooding |
173. |
Packet sniffers involve |
A. | active receiver |
B. | passive receiver |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» B. passive receiver |
174. |
Sniffers can be deployed in |
A. | wired environment |
B. | wifi |
C. | ethernet lan |
D. | all of the mentioned |
Answer» D. all of the mentioned |
175. |
Firewalls are often configured to block |
A. | udp traffic |
B. | tcp traffic |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» A. udp traffic |
176. |
DHCP (dynamic host configuration protocol) provides _____ to the client. |
A. | ip address |
B. | mac address |
C. | url |
D. | none of the mentioned |
Answer» A. ip address |
177. |
DHCP is used for |
A. | ipv6 |
B. | ipv4 |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
178. |
The DHCP server |
A. | maintains a database of available ip addresses |
B. | maintains the information about client configuration parameters |
C. | grants a ip address when receives a request from a client |
D. | all of the mentioned |
Answer» D. all of the mentioned |
179. |
IP assigned for a client by DHCP server is |
A. | for a limited period |
B. | for unlimited period |
C. | not time dependent |
D. | none of the mentioned |
Answer» A. for a limited period |
180. |
DHCP uses UDP port ____ for sending data to the server. |
A. | 66 |
B. | 67 |
C. | 68 |
D. | 69 |
Answer» B. 67 |
181. |
The DHCP server can provide the _______ of the IP addresses. |
A. | dynamic allocation |
B. | automatic allocation |
C. | static allocation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
182. |
DHCP client and servers on the same subnet communicate via |
A. | udp broadcast |
B. | udp unicast |
C. | tcp broadcast |
D. | tcp unicast |
Answer» A. udp broadcast |
183. |
After obtaining the IP address, to prevent the IP conflict the client may use |
A. | internet relay chat |
B. | broader gateway protocol |
C. | address resolution protocol |
D. | none of the mentioned |
Answer» C. address resolution protocol |
184. |
What is DHCP snooping? |
A. | techniques applied to ensure the security of an existing dhcp infrastructure |
B. | encryption of the dhcp server requests |
C. | algorithm for dhcp |
D. | none of the mentioned |
Answer» A. techniques applied to ensure the security of an existing dhcp infrastructure |
185. |
If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network. |
A. | mac address |
B. | ip address |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
186. |
Real-time transport protocol (RTP) is mostly used in |
A. | streaming media |
B. | video teleconference |
C. | television services |
D. | all of the mentioned |
Answer» D. all of the mentioned |
187. |
RTP is used to |
A. | carry the media stream |
B. | monitor transmission statistics of streams |
C. | monitor quality of service of streams |
D. | none of the mentioned |
Answer» A. carry the media stream |
188. |
RTP provides the facility of jitter ____ . |
A. | compensation |
B. | expansion |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. compensation |
189. |
Which protocol provides the synchronization between media streams? |
A. | rtp |
B. | rtcp |
C. | rpc |
D. | none of the mentioned |
Answer» B. rtcp |
190. |
An RTP session is established for |
A. | each media stream |
B. | all media streams |
C. | some predefined number of media streams |
D. | none of the mentioned |
Answer» A. each media stream |
191. |
RTP can use |
A. | unprevileleged udp ports |
B. | stream control transmission protocol |
C. | datagram congestion control protocol |
D. | all of the mentioned |
Answer» D. all of the mentioned |
192. |
Which one of the following multimedia formats can not be supported by RTP? |
A. | mpeg-4 |
B. | mjpeg |
C. | mpeg |
D. | none of the mentioned |
Answer» D. none of the mentioned |
193. |
An RTP header has a minimum size of |
A. | 12 bytes |
B. | 16 bytes |
C. | 24 bytes |
D. | 32 bytes |
Answer» A. 12 bytes |
194. |
Which one of the following is not correct? |
A. | rtcp provides canonical end-point identifiers to all session participants |
B. | rtcp reports are expected to be sent by all participants |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» D. none of the mentioned |
195. |
Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data? |
A. | srtp |
B. | rtcp |
C. | rcp |
D. | none of the mentioned |
Answer» A. srtp |
196. |
Ping can |
A. | measure round-trip time |
B. | report packet loss |
C. | report latency |
D. | all of the mentioned |
Answer» D. all of the mentioned |
197. |
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is |
A. | use dual-stack approach |
B. | tunneling |
C. | no solution |
D. | replace the system |
Answer» B. tunneling |
198. |
Ping sweep is a part of |
A. | traceroute |
B. | nmap |
C. | route |
D. | ipconfig |
Answer» B. nmap |
199. |
ICMP is used in |
A. | ping |
B. | traceroute |
C. | ifconfig |
D. | both a and b |
Answer» D. both a and b |
200. |
_____ command is used to manipulate TCP/IP routing table. |
A. | route |
B. | ipconfig |
C. | ifconfig |
D. | traceroute |
Answer» A. route |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.