116
74.9k
Chapter:

50+ Unit 4 Solved MCQs

in Data Communication and Networking

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Master of Computer Applications (MCA) .

Chapters

Chapter: Unit 4
1.

Transport layer protocols are useful for ensuring ______________ delivery.

A. H-2-H
B. H-2-R
C. N/W-2-N/W
D. End-2-End
Answer» A. H-2-H
2.

_______________is a reliable delivery mechanism.

A. IP
B. TCP
C. UDP
D. ARP
Answer» B. TCP
3.

Transport layer is _____________ the data link layer.

A. Above
B. Below
C. Depended on
D. None of the above
Answer» A. Above
4.

When a packet is lost in transit, it should be handled by _____________.

A. Sequence control
B. Loss control
C. Error control
D. Duplication control
Answer» A. Sequence control
5.

Internet is

A. a local computer network
B. a worldwide network of computers
C. an interconnected network of computers
D. a worldwide interconnected network of computers which use a common protocol
Answer» D. a worldwide interconnected network of computers which use a common protocol
6.

World Wide Web

A. is another name for internet
B. worldwide connection for computers
C. a collection of linked information residing on computers connected by the internet
D. a collection of worldwide information
Answer» C. a collection of linked information residing on computers connected by the internet
7.

HTML tags define

A. The data types of elements of document
B. Presentation of specified elements of a document
C. The contents of the document
D. The structure of the document
Answer» B. Presentation of specified elements of a document
8.

One of the responsibilities of the transport layer protocol is to create a ______ communication.

A. host-to-host
B. process-to-process
C. node-to-node
D. none of the above
Answer» B. process-to-process
9.

UDP is called a ________________transport protocol.

A. connectionless, reliable
B. connection-oriented, unreliable
C. connectionless, unreliable
D. none of the above
Answer» C. connectionless, unreliable
10.

UDP does not add anything to the services of IP except for providing _______ communication.

A. node-to-node
B. process-to-process
C. host-to-host
D. none of the above
Answer» B. process-to-process
11.

UDP is an acronym for _______.

A. User Delivery Protocol
B. User Datagram Procedure
C. User Datagram Protocol
D. None of the above
Answer» C. User Datagram Protocol
12.

Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.

A. client-server
B. client-client
C. server-server
D. none of the above
Answer» A. client-server
13.

The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.

A. UDP addresses
B. transport addresses
C. port addresses
D. none of the above
Answer» C. port addresses
14.

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.

A. well-known
B. registered
C. dynamic
D. none of the above
Answer» C. dynamic
15.

In the sending computer, UDP receives a data unit from the _______ layer.

A. application
B. transport
C. IP
D. none of the above
Answer» A. application
16.

In the sending computer, UDP sends a data unit to the _______ layer.

A. application
B. transport
C. IP
D. none of the above
Answer» C. IP
17.

UDP and TCP are both _______ layer protocols.

A. data link
B. network
C. transport
D. none of the above
Answer» C. transport
18.

Which of the following functions does UDP perform?

A. process-to-process communication
B. host-to-host communication
C. end-to-end reliable data delivery
D. none of the above
Answer» A. process-to-process communication
19.

When the IP layer of a receiving host receives a datagram, _______.

A. delivery is complete
B. a transport layer protocol takes over
C. a header is added
D. none of the above
Answer» B. a transport layer protocol takes over
20.

UDP needs the _______ address to deliver the user datagram to the correct application process.

A. port
B. application
C. internet
D. none of the above
Answer» A. port
21.

A port address in UDP is _______bits long.

A. 8
B. 16
C. 32
D. any of the above
Answer» B. 16
22.

Which of the following does UDP guarantee?

A. flow control
B. connection-oriented delivery
C. flow control
D. none of the above
Answer» D. none of the above
23.

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» C. authentication
24.

_________ means that a sender must not be able to deny sending a message that he sent.

A. Confidentiality
B. Integrity
C. Authentication
D. Non-repudiation
Answer» D. Non-repudiation
25.

________ means to prove the identity of the entity that tries to access the system's resources.

A. Message authentication
B. Entity authentication
C. Message confidentiality
D. none of the above
Answer» B. Entity authentication
26.

A(n) _________ can be used to preserve the integrity of a document or a message.

A. message digest
B. message summary
C. encrypted message
D. none of the above
Answer» A. message digest
27.

A(n) ________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» C. hash
28.

A hash function must meet ________ criteria.

A. two
B. three
C. four
D. none of the above
Answer» B. three
29.

Challenge-response authentication can be done using ________.

A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D. all of the above
Answer» D. all of the above
30.

A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A. KDC
B. CA
C. KDD
D. none of the above
Answer» A. KDC
31.

The _____________ translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
32.

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

A. HTTP
B. FTP
C. telnet
D. none
Answer» C. telnet
33.

Application layer protocol defines

A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the above
Answer» D. all of the above
34.

Which one of the following protocol delivers/stores mail to reciever server?

A. simple mail transfer protocol
B. post office protocol
C. internet mail access protocol
D. hypertext transfer protocol
Answer» A. simple mail transfer protocol
35.

Which one of the following is an internet standard protocol for managing devices on IP network?

A. dynamic host configuration protocol
B. simple network management protocol
C. internet message access protocol
D. media gateway protocol
Answer» B. simple network management protocol
36.

User datagram protocol is called connectionless because

A. all UDP packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. both (a) and (b)
D. none of the above
Answer» A. all UDP packets are treated independently by transport layer
37.

Transmission control protocol is

A. connection oriented protocol
B. uses a three way handshake to establish a connection
C. recievs data from application as a single stream
D. all of the above
Answer» D. all of the above
38.

An endpoint of an inter-process communication flow across a computer network is called

A. socket
B. pipe
C. port
D. none of the above
Answer» A. socket
39.

Transport layer aggregates data from different applications into a single stream before passing it to

A. network layer
B. data link layer
C. application layer
D. physical layer
Answer» A. network layer
40.

The ASCII encoding of binary data is called

A. base 64 encoding
B. base 32 encoding
C. base 16 encoding
D. base 8 encoding
Answer» A. base 64 encoding
41.

A high speed communication equipment typically would not be needed for

A. E-mail
B. Transferring large volume of data
C. Supporting communication between nodes in a LAN
D. All of these
Answer» A. E-mail
42.

What is Unicode?

A. Represents symbol or characters used in any langua
B. Only few languages are supported
C. Supports only few characters
D. Characters from A to Z
Answer» A. Represents symbol or characters used in any langua
43.

In OSI model dialogue control and token management are responsibilities of ?

A. Session Layer
B. Network layer
C. Transport layer
D. Data link layer
Answer» A. Session Layer
44.

An asymmetric-key (or public-key) cipher uses

A. 1 Key
B. 2 Key
C. 3 Key
D. 4 Key
Answer» B. 2 Key
45.

A straight permutation cipher or a straight P-box has same number of inputs as

A. cipher
B. Frames
C. Outputs
D. Bits
Answer» C. Outputs
46.

Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

A. Authenticated
B. Joined
C. Submit
D. Separate
Answer» A. Authenticated
47.

We use Cryptography term to transforming messages to make them secure and immune to

A. Change
B. Idle
C. Attacks
D. Defend
Answer» C. Attacks
48.

Shift cipher is sometimes referred to as the

A. Caesar cipher
B. Shift cipher
C. cipher
D. cipher text
Answer» A. Caesar cipher
49.

Substitutional cipers are

A. Monoalphabatic
B. Sami alphabetic
C. polyalphabetic
D. both a and c
Answer» D. both a and c
50.

Heart of Data Encryption Standard (DES), is the

A. Cipher
B. Rounds
C. Encryption
D. DES function
Answer» D. DES function

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.