McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
| 701. |
Which one of the following multimedia formats can not be supported by RTP? |
| A. | mpeg-4 |
| B. | mjpeg |
| C. | mpeg |
| D. | txt |
| Answer» D. txt | |
| 702. |
An RTP header has a minimum size of _________ |
| A. | 12 bytes |
| B. | 16 bytes |
| C. | 24 bytes |
| D. | 32 bytes |
| Answer» A. 12 bytes | |
| 703. |
Which one of the following is not correct? |
| A. | rtcp provides canonical end-point identifiers to all session participants |
| B. | rtcp reports are expected to be sent by all participants |
| C. | rtcp itself does not provide any flow encryption or authentication methods |
| D. | rtcp handles the actual data delivery |
| Answer» D. rtcp handles the actual data delivery | |
| 704. |
An RPC (remote procedure call) is initiated by the _________ |
| A. | server |
| B. | client |
| C. | client after the sever |
| D. | a third party |
| Answer» B. client | |
| 705. |
In RPC, while a server is processing the call, the client is blocked ________ |
| A. | unless the client sends an asynchronous request to the server |
| B. | unless the call processing is complete |
| C. | for the complete duration of the connection |
| D. | unless the server is disconnected |
| Answer» A. unless the client sends an asynchronous request to the server | |
| 706. |
A remote procedure call is _______ |
| A. | inter-process communication |
| B. | a single process |
| C. | a single thread |
| D. | a single stream |
| Answer» A. inter-process communication | |
| 707. |
RPC allows a computer program to cause a subroutine to execute in _________ |
| A. | its own address space |
| B. | another address space |
| C. | both its own address space and another address space |
| D. | applications address space |
| Answer» B. another address space | |
| 708. |
RPC works between two processes. These processes must be ____________ |
| A. | on the same computer |
| B. | on different computers connected with a network |
| C. | on the same computer and also on different computers connected with a network |
| D. | on none of the computers |
| Answer» C. on the same computer and also on different computers connected with a network | |
| 709. |
A remote procedure is uniquely identified by _________ |
| A. | program number |
| B. | version number |
| C. | procedure number |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 710. |
An RPC application requires _________ |
| A. | specific protocol for client server communication |
| B. | a client program |
| C. | a server program |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 711. |
RPC is a _________ |
| A. | synchronous operation |
| B. | asynchronous operation |
| C. | time independent operation |
| D. | channel specific operation |
| Answer» A. synchronous operation | |
| 712. |
Which of the following is an advantage of anomaly detection? |
| A. | rules are easy to define |
| B. | custom protocols can be easily analyzed |
| C. | the engine can scale as the rule set grows |
| D. | malicious activity that falls within normal usage patterns is detected |
| Answer» C. the engine can scale as the rule set grows | |
| 713. |
What is the purpose of a shadow honeypot? |
| A. | to flag attacks against known vulnerabilities |
| B. | to help reduce false positives in a signature-based ids |
| C. | to randomly check suspicious traffic identified by an anomaly detection system |
| D. | to enhance the accuracy of a traditional honeypot |
| Answer» C. to randomly check suspicious traffic identified by an anomaly detection system | |
| 714. |
At which two traffic layers do most commercial IDSes generate signatures? |
| A. | application layer and network layer |
| B. | network layer and session layer |
| C. | transport layer and application layer |
| D. | transport layer and network layer |
| Answer» D. transport layer and network layer | |
| 715. |
When discussing IDS/IPS, what is a signature? |
| A. | an electronic signature used to authenticate the identity of a user on the network |
| B. | attack-definition file |
| C. | it refers to “normal,” baseline network behavior |
| D. | it is used to authorize the users on a network |
| Answer» B. attack-definition file | |
| 716. |
Which of the following is true of signature-based IDSes? |
| A. | they alert administrators to deviations from “normal” traffic behavior |
| B. | they identify previously unknown attacks |
| C. | the technology is mature and reliable enough to use on production networks |
| D. | they scan network traffic or packets to identify matches with attack-definition files |
| Answer» D. they scan network traffic or packets to identify matches with attack-definition files | |
| 717. |
PPP provides the _______ layer in the TCP/IP suite. |
| A. | link |
| B. | network |
| C. | transport |
| D. | application |
| Answer» A. link | |
| 718. |
PPP consists of ________components |
| A. | three (encapsulating, the domain name system) |
| B. | three (encapsulating, a link control protocol, ncp) |
| C. | two (a link control protocol, simple network control protocol) |
| D. | one (simple network control protocol) |
| Answer» B. three (encapsulating, a link control protocol, ncp) | |
| 719. |
A Link Control Protocol (LCP) is used for ____________ |
| A. | establishing, configuring and testing the data-link connection |
| B. | establishing and configuring different network-layer protocols |
| C. | testing the different network-layer protocols |
| D. | provides for multiplexing of different network-layer protocols |
| Answer» A. establishing, configuring and testing the data-link connection | |
| 720. |
A family of network control protocols (NCPs) ____________ |
| A. | are a series of independently defined protocols that provide a dynamic |
| B. | are a series of independently-defined protocols that encapsulate |
| C. | are a series of independently defined protocols that provide transparent |
| D. | the same as nfs |
| Answer» B. are a series of independently-defined protocols that encapsulate | |
| 721. |
Choose the correct statement from the following. |
| A. | ppp can terminate the link at any time |
| B. | ppp can terminate the link only during the link establishment phase |
| C. | ppp can terminate the link during the authentication phase |
| D. | ppp can terminate the link during the callback control phase |
| Answer» A. ppp can terminate the link at any time | |
| 722. |
EIGRP metric is ________ |
| A. | k-values |
| B. | bandwidth only |
| C. | hop count |
| D. | delay only |
| Answer» A. k-values | |
| 723. |
EIGRP can support ____________ |
| A. | vlsm/subnetting |
| B. | auto summary |
| C. | unequal cast load balancing |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 724. |
EIGRP sends a hello message after every ___________ seconds. |
| A. | 5 seconds (lan), 60 seconds (wan) |
| B. | 5 seconds (lan), 5 seconds (wan) |
| C. | 15s |
| D. | 180s |
| Answer» A. 5 seconds (lan), 60 seconds (wan) | |
| 725. |
Administrative distance for internal EIGRP is ______ |
| A. | 90 |
| B. | 170 |
| C. | 110 |
| D. | 91 |
| Answer» A. 90 | |
| 726. |
The EIGRP metric values include: |
| A. | delay |
| B. | bandwidth |
| C. | mtu |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 727. |
For default gateway, which of following commands will you use on a Cisco router? |
| A. | ip default network |
| B. | ip default gateway |
| C. | ip default route |
| D. | default network |
| Answer» A. ip default network | |
| 728. |
Administrative distance for external EIGRP route is _______ |
| A. | 90 |
| B. | 170 |
| C. | 110 |
| D. | 100 |
| Answer» B. 170 | |
| 729. |
EIGRP uses the ____________ algorithm for finding shortest path. |
| A. | spf |
| B. | dual |
| C. | linkstat |
| D. | djikstra’s |
| Answer» B. dual | |
| 730. |
What are the other types of OLAP apart from ROLAP? |
| A. | HOLAP |
| B. | MOLAP |
| C. | DOLAP |
| D. | Both a and b above |
| Answer» B. MOLAP | |
| 731. |
A network router joins two together? |
| A. | Computers |
| B. | Switches |
| C. | Networks |
| D. | Gateway |
| Answer» C. Networks | |
| 732. |
Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues. |
| A. | True |
| B. | False |
| C. | none |
| D. | other |
| Answer» A. True | |
| 733. |
Which of the following below is a loopback IPaddress? |
| A. | 127.0.0.0 |
| B. | 127.0.1.1 |
| C. | 127.0.1.0 |
| D. | 127.0.0.1 |
| Answer» D. 127.0.0.1 | |
| 734. |
Ping command works on which protocol? |
| A. | ICMP |
| B. | TCP |
| C. | IP |
| D. | UDP |
| Answer» A. ICMP | |
| 735. |
Transport layer of OSI model lies between Network and layer |
| A. | Application |
| B. | Data link |
| C. | Session |
| D. | Presentation |
| Answer» C. Session | |
| 736. |
Which of the following protocols below work in the application layer? |
| A. | POP |
| B. | PPP |
| C. | FTP |
| D. | Both a and d above |
| Answer» D. Both a and d above | |
| 737. |
What is the port number for HTTP? |
| A. | 25 |
| B. | 80 |
| C. | 21 |
| D. | 65 |
| Answer» B. 80 | |
| 738. |
IP4 is more commonly used than IPv6? |
| A. | True |
| B. | False |
| C. | none |
| D. | other |
| Answer» A. True | |
| 739. |
From the options below, which suits best for MODEM? |
| A. | a device that modulates an analog carrier signal to encode digital information |
| B. | a device that modulates a digital carrier signal to encode analog information |
| C. | a device that modulates an analog carrier signal to decode digital information |
| D. | a device that modulates a digital carrier signal to decode analoginformation |
| Answer» A. a device that modulates an analog carrier signal to encode digital information | |
| 740. |
What is the size of an IP address? |
| A. | 64 bit |
| B. | 128 bit |
| C. | 16 bit |
| D. | 32 bit |
| Answer» D. 32 bit | |
| 741. |
MAC addresses are also known as? |
| A. | Hardware address |
| B. | Physical address |
| C. | both and b above |
| D. | IP address |
| Answer» C. both and b above | |
| 742. |
A network point that provides entrance into another network is called as |
| A. | Node |
| B. | Gateway |
| C. | Switch |
| D. | Router |
| Answer» B. Gateway | |
| 743. |
UDP is an unreliable protocol. |
| A. | True |
| B. | False |
| C. | none |
| D. | other |
| Answer» A. True | |
| 744. |
A stream socket provides communications between a client and a server |
| A. | One way |
| B. | Two way |
| C. | none |
| D. | other |
| Answer» B. Two way | |
| 745. |
Token Ring is a data link technology for? |
| A. | WAN |
| B. | MAN |
| C. | LAN |
| D. | both a and b above |
| Answer» C. LAN | |
| 746. |
Which of the following protocol below are suited for email retrieval? |
| A. | POP3 |
| B. | IMAP |
| C. | FTP |
| D. | Both and b above |
| Answer» D. Both and b above | |
| 747. |
TELNET used protocol for data connection |
| A. | TCP |
| B. | UDP |
| C. | IP |
| D. | DHCP |
| Answer» A. TCP | |
| 748. |
10Base5, 10Base2, 10BaseT are types of? |
| A. | Internet |
| B. | LAN |
| C. | Ethernet |
| D. | Cables |
| Answer» C. Ethernet | |
| 749. |
The process of assigning the IP address for specific times to the various hosts by DHCP is called? |
| A. | Lend |
| B. | sublease |
| C. | let |
| D. | Lease |
| Answer» D. Lease | |
| 750. |
What is the full form of URL? |
| A. | Uniform routing locator |
| B. | Uniform Resource Locator |
| C. | Universal Resource Locator |
| D. | Uniform router locator |
| Answer» B. Uniform Resource Locator | |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.