

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
451. |
Which one of the following is not true? |
A. | telnet defines a network virtual terminal (nvt) standard |
B. | client programs interact with nvt |
C. | server translates nvt operations |
D. | client can transfer files using to remote server using nvt |
Answer» D. client can transfer files using to remote server using nvt |
452. |
All telnet operations are sent as ________ |
A. | 4 bits |
B. | 8 bits |
C. | 16 bits |
D. | 32 bits |
Answer» B. 8 bits |
453. |
AbsoluteTelnet is a telnet client for _______ Operating system. |
A. | windows |
B. | linux |
C. | mac |
D. | ubuntu |
Answer» A. windows |
454. |
The decimal code of Interpret as Command (IAC) character is _______ |
A. | 252 |
B. | 253 |
C. | 254 |
D. | 255 |
Answer» D. 255 |
455. |
Which of the following is false with respect to TCP? |
A. | connection-oriented |
B. | process-to-process |
C. | transport layer protocol |
D. | unreliable |
Answer» D. unreliable |
456. |
In TCP, sending and receiving data is done as _______ |
A. | stream of bytes |
B. | sequence of characters |
C. | lines of data |
D. | packets |
Answer» A. stream of bytes |
457. |
TCP groups a number of bytes together into a packet called _______ |
A. | packet |
B. | buffer |
C. | segment |
D. | stack |
Answer» C. segment |
458. |
Communication offered by TCP is ________ |
A. | full-duplex |
B. | half-duplex |
C. | semi-duplex |
D. | byte by byte |
Answer» A. full-duplex |
459. |
The value of acknowledgement field in a segment defines _______ |
A. | sequence number of the byte received previously |
B. | total number of bytes to receive |
C. | sequence number of the next byte to be received |
D. | sequence of zeros and ones |
Answer» C. sequence number of the next byte to be received |
460. |
Size of TCP segment header ranges between ___________ |
A. | 16 and 32 bytes |
B. | 16 and 32 bits |
C. | 20 and 60 bytes |
D. | 20 and 60 bits |
Answer» C. 20 and 60 bytes |
461. |
Connection establishment in TCP is done by which mechanism? |
A. | flow control |
B. | three-way handshaking |
C. | forwarding |
D. | synchronization |
Answer» B. three-way handshaking |
462. |
SYNC flooding attack belongs to a type of security attack known as ___________ |
A. | sync flooding attack |
B. | active attack |
C. | passive attack |
D. | denial-of-service attack |
Answer» D. denial-of-service attack |
463. |
What allows TCP to detect lost segments and in turn recover from that loss? |
A. | sequence number |
B. | acknowledgment number |
C. | checksum |
D. | both sequence & acknowledgment number |
Answer» B. acknowledgment number |
464. |
Which of the following is false with respect to UDP? |
A. | connection-oriented |
B. | unreliable |
C. | transport layer protocol |
D. | low overhead |
Answer» A. connection-oriented |
465. |
Return value of the UDP port “Chargen” is _______ |
A. | string of characters |
B. | string of integers |
C. | array of characters with integers |
D. | array of zero’s and one’s |
Answer» A. string of characters |
466. |
Beyond IP, UDP provides additional services such as _______ |
A. | routing and switching |
B. | sending and receiving of packets |
C. | multiplexing and demultiplexing |
D. | demultiplexing and error checking |
Answer» D. demultiplexing and error checking |
467. |
What is the main advantage of UDP? |
A. | more overload |
B. | reliable |
C. | low overhead |
D. | fast |
Answer» C. low overhead |
468. |
Port number used by Network Time Protocol (NTP) with UDP is ________ |
A. | 161 |
B. | 123 |
C. | 162 |
D. | 124 |
Answer» B. 123 |
469. |
What is the header size of a UDP packet? |
A. | 8 bytes |
B. | 8 bits |
C. | 16 bytes |
D. | 124 bytes |
Answer» A. 8 bytes |
470. |
The port number is “ephemeral port number”, if the source host is _______ |
A. | ntp |
B. | echo |
C. | server |
D. | client |
Answer» D. client |
471. |
“Total length” field in UDP packet header is the length of _________ |
A. | only udp header |
B. | only data |
C. | only checksum |
D. | udp header plus data |
Answer» D. udp header plus data |
472. |
Which is the correct expression for the length of UDP datagram? |
A. | udp length = ip length – ip header’s length |
B. | udp length = udp length – udp header’s length |
C. | udp length = ip length + ip header’s length |
D. | udp length = udp length + udp header’s length |
Answer» A. udp length = ip length – ip header’s length |
473. |
The ______ field is used to detect errors over the entire user datagram. |
A. | udp header |
B. | checksum |
C. | source port |
D. | destination port |
Answer» B. checksum |
474. |
IPsec defines two protocols: _______ and ________ |
A. | ah; ssl |
B. | pgp; esp |
C. | ah; esp |
D. | pgp; ssl |
Answer» C. ah; esp |
475. |
IP Security operates in which layer of the OSI model? |
A. | network |
B. | transport |
C. | application |
D. | physical |
Answer» A. network |
476. |
ESP does not provide ________ |
A. | source authentication |
B. | data integrity |
C. | privacy |
D. | error control |
Answer» D. error control |
477. |
Two broad categories of congestion control are |
A. | open-loop and closed-loop |
B. | open-control and closed-control |
C. | active control and passive control |
D. | active loop and passive loop |
Answer» A. open-loop and closed-loop |
478. |
In open-loop control, policies are applied to __________ |
A. | remove after congestion occurs |
B. | remove after sometime |
C. | prevent before congestion occurs |
D. | prevent before sending packets |
Answer» C. prevent before congestion occurs |
479. |
Retransmission of packets must not be done when _______ |
A. | packet is lost |
B. | packet is corrupted |
C. | packet is needed |
D. | packet is error-free |
Answer» D. packet is error-free |
480. |
Discarding policy is mainly done by _______ |
A. | sender |
B. | receiver |
C. | router |
D. | switch |
Answer» C. router |
481. |
Closed-Loop control mechanisms try to _________ |
A. | remove after congestion occurs |
B. | remove after sometime |
C. | prevent before congestion occurs |
D. | prevent before sending packets |
Answer» A. remove after congestion occurs |
482. |
Backpressure technique can be applied only to _______ |
A. | congestion networks |
B. | closed circuit networks |
C. | open circuit networks |
D. | virtual circuit networks |
Answer» D. virtual circuit networks |
483. |
The packet sent by a node to the source to inform it of congestion is called _______ |
A. | explicit |
B. | discard |
C. | choke |
D. | backpressure |
Answer» C. choke |
484. |
Which of the following is not a characteristic of Virtual Circuit Network? |
A. | there are setup and teardown phases in addition to the data transfer phase |
B. | resources can be allocated during setup phase or on demand |
C. | all packets follow the same path established during the connection |
D. | virtual circuit network is implemented in application layer |
Answer» D. virtual circuit network is implemented in application layer |
485. |
Which of the following is not a phase of virtual circuit network? |
A. | setup phase |
B. | data transfer phase |
C. | termination phase |
D. | teardown phase |
Answer» C. termination phase |
486. |
Steps required in setup process are ___________ |
A. | setup request and acknowledgement |
B. | setup request and setup response |
C. | setup request and setup termination |
D. | setup and termination steps |
Answer» A. setup request and acknowledgement |
487. |
Delay of the resource allocated during setup phase during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» C. same for each packet |
488. |
Delay of the resource allocated on demand during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» D. different for each packet |
489. |
In data transfer phase, how many columns does the table contain? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 |
490. |
ATM and frame relay are ________ |
A. | virtual circuit networks |
B. | datagram networks |
C. | virtual private networks |
D. | virtual public networks |
Answer» A. virtual circuit networks |
491. |
ATM uses _______________ |
A. | asynchronous frequency division multiplexing |
B. | asynchronous time division multiplexing |
C. | asynchronous space division multiplexing |
D. | asynchronous amplitude division multiplexing |
Answer» B. asynchronous time division multiplexing |
492. |
ATM standard defines _______ layers. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
493. |
ATM can be used for ________ |
A. | local area network |
B. | wide area network |
C. | campus area network |
D. | networks covering any range |
Answer» D. networks covering any range |
494. |
An ATM cell has the payload field of __________ |
A. | 32 bytes |
B. | 48 bytes |
C. | 64 bytes |
D. | 128 bytes |
Answer» B. 48 bytes |
495. |
Frame relay has error detection at the ______ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» B. data link layer |
496. |
Virtual circuit identifier in frame relay is called ______ |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | circuit connection identifier |
Answer» A. data link connection identifier |
497. |
Frame relay has _______ |
A. | only physical layer |
B. | only data link layer |
C. | only network layer |
D. | both physical and data link layer |
Answer» D. both physical and data link layer |
498. |
In frame relay networks, extended address is used _______ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» A. to increase the range of data link connection identifiers |
499. |
What is FRAD in frame relay network? |
A. | frad assembles and disassembles the frames coming from other protocols |
B. | frad is used for modulation and demodulation |
C. | frad is used for error detection |
D. | frad is used for error recovery |
Answer» A. frad assembles and disassembles the frames coming from other protocols |
500. |
Frame Relay is cheaper than other _____ |
A. | lans |
B. | wans |
C. | mans |
D. | multipoint networks |
Answer» B. wans |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.