Quiznetik

Computer Networks | Set 5

1. Which one of the following protocol is used to receive mail messages?

Correct : D. ftp

2. What is on-demand mail relay (ODMR)?

Correct : B. an smtp extension

3. An email client needs to know the _________ of its initial SMTP server.

Correct : A. ip address

4. An SMTP session may not include _______

Correct : D. one http transaction

5. SMTP defines _______

Correct : A. message transport

6. SMTP is not used to deliver messages to ______

Correct : C. user’s word processor

7. The entire hostname has a maximum of ___________

Correct : A. 255 characters

8. A DNS client is called _________

Correct : B. dns resolver

9. Servers handle requests for other domains _______

Correct : B. by contacting remote dns server

10. DNS database contains _______

Correct : D. all of the mentioned

11. If a server has no clue about where to find the address for a hostname then _______

Correct : A. server asks to the root server

12. Wildcard domain names start with label _______

Correct : B. *

13. The domain name system is maintained by _______

Correct : A. distributed database system

14. Secure shell (SSH) network protocol is used for __________

Correct : D. all of the mentioned

15. SSH can be used in only _____________

Correct : C. both unix-like and windows systems

16. SSH uses ___________ to authenticate the remote computer.

Correct : A. public-key cryptography

17. Which standard TCP port is assigned for contacting SSH servers?

Correct : B. port 22

18. Which one of the following is a file transfer protocol using SSH?

Correct : D. all of the mentioned

19. SSH-2 does not contain ______________

Correct : C. physical layer

20. Which one of the following feature was present in SSH protocol, version 1?

Correct : D. none of the mentioned

21. SCP protocol is evolved from __________ over SSH.

Correct : A. rcp protocol

22. Which one of the following authentication method is used by SSH?

Correct : D. all of the mentioned

23. DHCP (dynamic host configuration protocol) provides __________ to the client.

Correct : A. ip address

24. DHCP is used for ________

Correct : C. both ipv6 and ipv4

25. The DHCP server _________

Correct : D. all of the mentioned

26. IP assigned for a client by DHCP server is

Correct : A. for a limited period

27. DHCP uses UDP port _________ for sending data to the server.

Correct : B. 67

28. DHCP client and servers on the same subnet communicate via _________

Correct : A. udp broadcast

29. WPA2 is used for security in _______

Correct : C. wi-fi

30. VPNs are financially speaking __________

Correct : C. usually cheaper than leased lines

31. Storage management comprises of _______________

Correct : D. all of the mentioned

32. Which of the following is not a storage device?

Correct : D. hub

33. Which protocols are used for Storage management?

Correct : A. snmp

34. How do Storage administrators ensure secure access to storage devices?

Correct : A. by using zoning

35. Effective Storage management does not include __________

Correct : D. connection

36. SMI-S Standard uses which of the following?

Correct : B. cim-xml/http

37. Full duplex mode increases the capacity of each domain by ________

Correct : A. 10 to 20 mbps

38. Configuration management can be divided into which two subsystems?

Correct : A. reconfiguration and documentation

39. To use a Simple Network Management System, we need _______

Correct : D. rules

40. The main difference between SNMPv3 and SNMPv2 is _______

Correct : D. enhanced security

41. BER stands for ________

Correct : A. basic encoding rules

42. SNMP is the framework for managing devices in an internet using the ______

Correct : A. tcp/ip protocol

43. Structure of Management Information (SMI), is the guideline of ________

Correct : B. snmp

44. The application layer protocol used by a Telnet application is ________

Correct : A. telnet

45. _______ allows you to connect and login to a remote computer

Correct : A. telnet

46. Telnet is used for _______

Correct : C. remote login

47. Which one of the following is not correct?

Correct : C. telnet can also be used for file transfer

48. Which operating mode of telnet is full duplex?

Correct : C. line mode

49. If we want that a character be interpreted by the client instead of server _________

Correct : A. interpret as command (iac) escape character has to be used

50. Telnet protocol is used to establish a connection to __________

Correct : C. tcp port number 23

51. Which one of the following is not true?

Correct : D. client can transfer files using to remote server using nvt

52. All telnet operations are sent as ________

Correct : B. 8 bits

53. AbsoluteTelnet is a telnet client for _______ Operating system.

Correct : A. windows

54. The decimal code of Interpret as Command (IAC) character is _______

Correct : D. 255

55. Which of the following is false with respect to TCP?

Correct : D. unreliable

56. In TCP, sending and receiving data is done as _______

Correct : A. stream of bytes

57. TCP groups a number of bytes together into a packet called _______

Correct : C. segment

58. Communication offered by TCP is ________

Correct : A. full-duplex

59. The value of acknowledgement field in a segment defines _______

Correct : C. sequence number of the next byte to be received

60. Size of TCP segment header ranges between ___________

Correct : C. 20 and 60 bytes

61. Connection establishment in TCP is done by which mechanism?

Correct : B. three-way handshaking

62. SYNC flooding attack belongs to a type of security attack known as ___________

Correct : D. denial-of-service attack

63. What allows TCP to detect lost segments and in turn recover from that loss?

Correct : B. acknowledgment number

64. Which of the following is false with respect to UDP?

Correct : A. connection-oriented

65. Return value of the UDP port “Chargen” is _______

Correct : A. string of characters

66. Beyond IP, UDP provides additional services such as _______

Correct : D. demultiplexing and error checking

67. What is the main advantage of UDP?

Correct : C. low overhead

68. Port number used by Network Time Protocol (NTP) with UDP is ________

Correct : B. 123

69. What is the header size of a UDP packet?

Correct : A. 8 bytes

70. The port number is “ephemeral port number”, if the source host is _______

Correct : D. client

71. “Total length” field in UDP packet header is the length of _________

Correct : D. udp header plus data

72. Which is the correct expression for the length of UDP datagram?

Correct : A. udp length = ip length – ip header’s length

73. The ______ field is used to detect errors over the entire user datagram.

Correct : B. checksum

74. IPsec defines two protocols: _______ and ________

Correct : C. ah; esp

75. IP Security operates in which layer of the OSI model?

Correct : A. network

76. ESP does not provide ________

Correct : D. error control

77. Two broad categories of congestion control are

Correct : A. open-loop and closed-loop

78. In open-loop control, policies are applied to __________

Correct : C. prevent before congestion occurs

79. Retransmission of packets must not be done when _______

Correct : D. packet is error-free

80. Discarding policy is mainly done by _______

Correct : C. router

81. Closed-Loop control mechanisms try to _________

Correct : A. remove after congestion occurs

82. Backpressure technique can be applied only to _______

Correct : D. virtual circuit networks

83. The packet sent by a node to the source to inform it of congestion is called _______

Correct : C. choke

84. Which of the following is not a characteristic of Virtual Circuit Network?

Correct : D. virtual circuit network is implemented in application layer

85. Which of the following is not a phase of virtual circuit network?

Correct : C. termination phase

86. Steps required in setup process are ___________

Correct : A. setup request and acknowledgement

87. Delay of the resource allocated during setup phase during data transfer is ________

Correct : C. same for each packet

88. Delay of the resource allocated on demand during data transfer is ________

Correct : D. different for each packet

89. In data transfer phase, how many columns does the table contain?

Correct : D. 4

90. ATM and frame relay are ________

Correct : A. virtual circuit networks

91. ATM uses _______________

Correct : B. asynchronous time division multiplexing

92. ATM standard defines _______ layers.

Correct : B. 3

93. ATM can be used for ________

Correct : D. networks covering any range

94. An ATM cell has the payload field of __________

Correct : B. 48 bytes

95. Frame relay has error detection at the ______

Correct : B. data link layer

96. Virtual circuit identifier in frame relay is called ______

Correct : A. data link connection identifier

97. Frame relay has _______

Correct : D. both physical and data link layer

98. In frame relay networks, extended address is used _______

Correct : A. to increase the range of data link connection identifiers

99. What is FRAD in frame relay network?

Correct : A. frad assembles and disassembles the frames coming from other protocols

100. Frame Relay is cheaper than other _____

Correct : B. wans