MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 6

Choose a topic to test your knowledge and improve your MCA skills

The DHCP server can provide the _______ of the IP addresses.





✅ Correct Answer: 4

DHCP client and servers on the same subnet communicate via _________





✅ Correct Answer: 1

After obtaining the IP address, to prevent the IP conflict the client may use ____





✅ Correct Answer: 3

What is DHCP snooping?





✅ Correct Answer: 1

If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.





✅ Correct Answer: 3

IPSec is designed to provide security at the _______





✅ Correct Answer: 2

In tunnel mode, IPSec protects the ______





✅ Correct Answer: 1

Which component is included in IP security?





✅ Correct Answer: 4

WPA2 is used for security in _______





✅ Correct Answer: 3

An attempt to make a computer resource unavailable to its intended users is called ______





✅ Correct Answer: 1

Extensible authentication protocol is authentication framework frequently used in ______





✅ Correct Answer: 2

Pretty good privacy (PGP) is used in ______





✅ Correct Answer: 2

PGP encrypts data by using a block cipher called ______





✅ Correct Answer: 1

When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________





✅ Correct Answer: 3

A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.





✅ Correct Answer: 2

When were VPNs introduced into the commercial world?





✅ Correct Answer: 4

What protocol is NOT used in the operation of a VPN?





✅ Correct Answer: 3

Which of the following statements is NOT true concerning VPNs?





✅ Correct Answer: 4

Traffic in a VPN is NOT _______





✅ Correct Answer: 3

VPNs are financially speaking ______





✅ Correct Answer: 3

Which layer 3 protocols can be transmitted over an L2TP VPN?





✅ Correct Answer: 4

ESP (Encapsulating Security Protocol) is defined in which of the following standards?





✅ Correct Answer: 1

L2F was developed by which company?





✅ Correct Answer: 2

Which layer of the OSI reference model does PPTP work at?





✅ Correct Answer: 2

Which layer of the OSI reference model does IPsec work at?





✅ Correct Answer: 3

Storage management comprises of ________





✅ Correct Answer: 4

Which of the following is not a storage device?





✅ Correct Answer: 4

Which protocols are used for Storage management?





✅ Correct Answer: 1

Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.





✅ Correct Answer: 4

How do Storage administrators ensure secure access to storage devices?





✅ Correct Answer: 1

Effective Storage management does not include ____





✅ Correct Answer: 4

Among the following, identify which task is not involved in Storage Capacity management?





✅ Correct Answer: 4

Effect of open standards like SMI(s) is _________





✅ Correct Answer: 4

Task of Distributed Management Task Force is not ________





✅ Correct Answer: 4

SMI-S Standard uses which of the following?





✅ Correct Answer: 2

The application-level protocol in which a few manager stations control a set of agents is called ______





✅ Correct Answer: 3

Full duplex mode increases the capacity of each domain by ________





✅ Correct Answer: 1

Configuration management can be divided into which two subsystems?





✅ Correct Answer: 1

To use a Simple Network Management System, we need _______





✅ Correct Answer: 4

The main difference between SNMPv3 and SNMPv2 is _______





✅ Correct Answer: 4

In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________





✅ Correct Answer: 4

BER stands for ________





✅ Correct Answer: 1

Control of the users’ access to network resources through charges is the main responsibility of ________





✅ Correct Answer: 3

SNMP is the framework for managing devices in an internet using the ______





✅ Correct Answer: 1

Structure of Management Information (SMI), is the guideline of ________





✅ Correct Answer: 2

The application layer protocol used by a Telnet application is ________





✅ Correct Answer: 1

Which amongst the following statements is correct for “character at a time” mode?





✅ Correct Answer: 2

_______ allows you to connect and login to a remote computer





✅ Correct Answer: 1

What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?





✅ Correct Answer: 3

Telnet is used for _______





✅ Correct Answer: 3