

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Master of Computer Applications (MCA) .
Chapters
1. |
Transport layer protocols are useful for ensuring ______________ delivery. |
A. | H-2-H |
B. | H-2-R |
C. | N/W-2-N/W |
D. | End-2-End |
Answer» A. H-2-H |
2. |
_______________is a reliable delivery mechanism. |
A. | IP |
B. | TCP |
C. | UDP |
D. | ARP |
Answer» B. TCP |
3. |
Transport layer is _____________ the data link layer. |
A. | Above |
B. | Below |
C. | Depended on |
D. | None of the above |
Answer» A. Above |
4. |
When a packet is lost in transit, it should be handled by _____________. |
A. | Sequence control |
B. | Loss control |
C. | Error control |
D. | Duplication control |
Answer» A. Sequence control |
5. |
Internet is |
A. | a local computer network |
B. | a worldwide network of computers |
C. | an interconnected network of computers |
D. | a worldwide interconnected network of computers which use a common protocol |
Answer» D. a worldwide interconnected network of computers which use a common protocol |
6. |
World Wide Web |
A. | is another name for internet |
B. | worldwide connection for computers |
C. | a collection of linked information residing on computers connected by the internet |
D. | a collection of worldwide information |
Answer» C. a collection of linked information residing on computers connected by the internet |
7. |
HTML tags define |
A. | The data types of elements of document |
B. | Presentation of specified elements of a document |
C. | The contents of the document |
D. | The structure of the document |
Answer» B. Presentation of specified elements of a document |
8. |
One of the responsibilities of the transport layer protocol is to create a ______ communication. |
A. | host-to-host |
B. | process-to-process |
C. | node-to-node |
D. | none of the above |
Answer» B. process-to-process |
9. |
UDP is called a ________________transport protocol. |
A. | connectionless, reliable |
B. | connection-oriented, unreliable |
C. | connectionless, unreliable |
D. | none of the above |
Answer» C. connectionless, unreliable |
10. |
UDP does not add anything to the services of IP except for providing _______ communication. |
A. | node-to-node |
B. | process-to-process |
C. | host-to-host |
D. | none of the above |
Answer» B. process-to-process |
11. |
UDP is an acronym for _______. |
A. | User Delivery Protocol |
B. | User Datagram Procedure |
C. | User Datagram Protocol |
D. | None of the above |
Answer» C. User Datagram Protocol |
12. |
Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm. |
A. | client-server |
B. | client-client |
C. | server-server |
D. | none of the above |
Answer» A. client-server |
13. |
The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________. |
A. | UDP addresses |
B. | transport addresses |
C. | port addresses |
D. | none of the above |
Answer» C. port addresses |
14. |
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. |
A. | well-known |
B. | registered |
C. | dynamic |
D. | none of the above |
Answer» C. dynamic |
15. |
In the sending computer, UDP receives a data unit from the _______ layer. |
A. | application |
B. | transport |
C. | IP |
D. | none of the above |
Answer» A. application |
16. |
In the sending computer, UDP sends a data unit to the _______ layer. |
A. | application |
B. | transport |
C. | IP |
D. | none of the above |
Answer» C. IP |
17. |
UDP and TCP are both _______ layer protocols. |
A. | data link |
B. | network |
C. | transport |
D. | none of the above |
Answer» C. transport |
18. |
Which of the following functions does UDP perform? |
A. | process-to-process communication |
B. | host-to-host communication |
C. | end-to-end reliable data delivery |
D. | none of the above |
Answer» A. process-to-process communication |
19. |
When the IP layer of a receiving host receives a datagram, _______. |
A. | delivery is complete |
B. | a transport layer protocol takes over |
C. | a header is added |
D. | none of the above |
Answer» B. a transport layer protocol takes over |
20. |
UDP needs the _______ address to deliver the user datagram to the correct application process. |
A. | port |
B. | application |
C. | internet |
D. | none of the above |
Answer» A. port |
21. |
A port address in UDP is _______bits long. |
A. | 8 |
B. | 16 |
C. | 32 |
D. | any of the above |
Answer» B. 16 |
22. |
Which of the following does UDP guarantee? |
A. | flow control |
B. | connection-oriented delivery |
C. | flow control |
D. | none of the above |
Answer» D. none of the above |
23. |
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» C. authentication |
24. |
_________ means that a sender must not be able to deny sending a message that he sent. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Non-repudiation |
Answer» D. Non-repudiation |
25. |
________ means to prove the identity of the entity that tries to access the system's resources. |
A. | Message authentication |
B. | Entity authentication |
C. | Message confidentiality |
D. | none of the above |
Answer» B. Entity authentication |
26. |
A(n) _________ can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | none of the above |
Answer» A. message digest |
27. |
A(n) ________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» C. hash |
28. |
A hash function must meet ________ criteria. |
A. | two |
B. | three |
C. | four |
D. | none of the above |
Answer» B. three |
29. |
Challenge-response authentication can be done using ________. |
A. | symmetric-key ciphers |
B. | asymmetric-key ciphers |
C. | keyed-hash functions |
D. | all of the above |
Answer» D. all of the above |
30. |
A(n) _____ is a trusted third party that assigns a symmetric key to two parties. |
A. | KDC |
B. | CA |
C. | KDD |
D. | none of the above |
Answer» A. KDC |
31. |
The _____________ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
32. |
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? |
A. | HTTP |
B. | FTP |
C. | telnet |
D. | none |
Answer» C. telnet |
33. |
Application layer protocol defines |
A. | types of messages exchanged |
B. | message format, syntax and semantics |
C. | rules for when and how processes send and respond to messages |
D. | all of the above |
Answer» D. all of the above |
34. |
Which one of the following protocol delivers/stores mail to reciever server? |
A. | simple mail transfer protocol |
B. | post office protocol |
C. | internet mail access protocol |
D. | hypertext transfer protocol |
Answer» A. simple mail transfer protocol |
35. |
Which one of the following is an internet standard protocol for managing devices on IP network? |
A. | dynamic host configuration protocol |
B. | simple network management protocol |
C. | internet message access protocol |
D. | media gateway protocol |
Answer» B. simple network management protocol |
36. |
User datagram protocol is called connectionless because |
A. | all UDP packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | both (a) and (b) |
D. | none of the above |
Answer» A. all UDP packets are treated independently by transport layer |
37. |
Transmission control protocol is |
A. | connection oriented protocol |
B. | uses a three way handshake to establish a connection |
C. | recievs data from application as a single stream |
D. | all of the above |
Answer» D. all of the above |
38. |
An endpoint of an inter-process communication flow across a computer network is called |
A. | socket |
B. | pipe |
C. | port |
D. | none of the above |
Answer» A. socket |
39. |
Transport layer aggregates data from different applications into a single stream before passing it to |
A. | network layer |
B. | data link layer |
C. | application layer |
D. | physical layer |
Answer» A. network layer |
40. |
The ASCII encoding of binary data is called |
A. | base 64 encoding |
B. | base 32 encoding |
C. | base 16 encoding |
D. | base 8 encoding |
Answer» A. base 64 encoding |
41. |
A high speed communication equipment typically would not be needed for |
A. | |
B. | Transferring large volume of data |
C. | Supporting communication between nodes in a LAN |
D. | All of these |
Answer» A. E-mail |
42. |
What is Unicode? |
A. | Represents symbol or characters used in any langua |
B. | Only few languages are supported |
C. | Supports only few characters |
D. | Characters from A to Z |
Answer» A. Represents symbol or characters used in any langua |
43. |
In OSI model dialogue control and token management are responsibilities of ? |
A. | Session Layer |
B. | Network layer |
C. | Transport layer |
D. | Data link layer |
Answer» A. Session Layer |
44. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 Key |
B. | 2 Key |
C. | 3 Key |
D. | 4 Key |
Answer» B. 2 Key |
45. |
A straight permutation cipher or a straight P-box has same number of inputs as |
A. | cipher |
B. | Frames |
C. | Outputs |
D. | Bits |
Answer» C. Outputs |
46. |
Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not |
A. | Authenticated |
B. | Joined |
C. | Submit |
D. | Separate |
Answer» A. Authenticated |
47. |
We use Cryptography term to transforming messages to make them secure and immune to |
A. | Change |
B. | Idle |
C. | Attacks |
D. | Defend |
Answer» C. Attacks |
48. |
Shift cipher is sometimes referred to as the |
A. | Caesar cipher |
B. | Shift cipher |
C. | cipher |
D. | cipher text |
Answer» A. Caesar cipher |
49. |
Substitutional cipers are |
A. | Monoalphabatic |
B. | Sami alphabetic |
C. | polyalphabetic |
D. | both a and c |
Answer» D. both a and c |
50. |
Heart of Data Encryption Standard (DES), is the |
A. | Cipher |
B. | Rounds |
C. | Encryption |
D. | DES function |
Answer» D. DES function |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.