R4RIN
Articles
Java 8
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 7
Choose a topic to test your knowledge and improve your MCA skills
1. Which one of the following is not correct?
telnet is a general purpose client-server program
telnet lets user access an application on a remote computer
telnet can also be used for file transfer
telnet can be used for remote login
2. Which operating mode of telnet is full duplex?
default mode
server mode
line mode
character mode
3. If we want that a character be interpreted by the client instead of server ______
interpret as command (IAC) escape character has to be used
control functions has to be disabled
it is not possible
cli character has to be used
4. Telnet protocol is used to establish a connection to ______
TCP port number 21
TCP port number 22
TCP port number 23
TCP port number 25
5. Which one of the following is not true?
telnet defines a network virtual terminal (NVT) standard
client programs interact with NVT
server translates NVT operations
client can transfer files using to remote server using NVT
6. AbsoluteTelnet is a telnet client for _______ Operating system.
windows
linux
mac
ubuntu
7. The decimal code of Interpret as Command (IAC) character is _______
252
253
254
255
8. Which of the following is true for character mode operation of telnet implementation?
each character typed is sent by the client to the server
each character typed is discarded by the server
each character typed is aggregated into a word and then sent to the server
each character type is aggregated into a line and then sent to the server
9. In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?
default mode
character mode
server mode
command mode
10. Which one of the following is not correct?
telnet is a general purpose client-server program
telnet lets user access an application on a remote computer
telnet can also be used for file transfer
telnet can be used for remote login
11. Which of the following is false with respect to TCP?
Connection-oriented
Process-to-process
Transport layer protocol
Unreliable
12. In TCP, sending and receiving data is done as _______
Stream of bytes
Sequence of characters
Lines of data
Packets
13. TCP process may not write and read data at the same speed. So we need __________ for storage.
Packets
Buffers
Segments
Stacks
14. TCP groups a number of bytes together into a packet called _______
Packet
Buffer
Segment
Stack
15. Communication offered by TCP is ________
Full-duplex
Half-duplex
Semi-duplex
Byte by byte
16. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
Packet
Buffer
Segment
Acknowledgment
17. In segment header, sequence number and acknowledgement number fields refer to _______
Byte number
Buffer number
Segment number
Acknowledgment
18. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
10000
10001
12001
11001
19. Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________
Fixed number
Random sequence of 0’s and 1’s
One
Sequence of zero’s and one’s
20. The value of acknowledgement field in a segment defines _______
sequence number of the byte received previously
total number of bytes to receive
sequence number of the next byte to be received
sequence of zeros and ones
21. The receiver of the data controls the amount of data that are to be sent by the sender is referred to as _________
Flow control
Error control
Congestion control
Error detection
22. Size of TCP segment header ranges between ______
16 and 32 bytes
16 and 32 bits
20 and 60 bytes
20 and 60 bits
23. Connection establishment in TCP is done by which mechanism?
Flow control
Three-Way Handshaking
Forwarding
Synchronization
24. The server program tells its TCP that it is ready to accept a connection. This process is called _____
Active open
Active close
Passive close
Passive open
25. A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ______
Active open
Active close
Passive close
Passive open
26. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ________
Mutual open
Mutual Close
Simultaneous open
Simultaneous close
27. A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?
SYNC flooding attack
Active attack
Passive attack
Denial-of-service attack
28. SYNC flooding attack belongs to a type of security attack known as _____
SYNC flooding attack
Active attack
Passive attack
Denial-of-service attack
29. The sizes of source and destination port address in TCP header are ___________ respectively.
16-bits and 32-bits
16-bits and 16-bits
32-bits and 16-bits
32-bits and 32-bits
30. What allows TCP to detect lost segments and in turn recover from that loss?
Sequence number
Acknowledgment number
Checksum
Both Sequence & Acknowledgment number
31. Which of the following is false with respect to UDP?
Connection-oriented
Unreliable
Transport layer protocol
Low overhead
32. Return value of the UDP port “Chargen” is _______
String of characters
String of integers
Array of characters with integers
Array of zero’s and one’s
33. Beyond IP, UDP provides additional services such as _______
Routing and switching
Sending and receiving of packets
Multiplexing and demultiplexing
Demultiplexing and error checking
34. What is the main advantage of UDP?
More overload
Reliable
Low overhead
Fast
35. Port number used by Network Time Protocol (NTP) with UDP is ____
161
123
162
124
36. What is the header size of a UDP packet?
8 bytes
8 bits
16 bytes
124 bytes
37. The port number is “ephemeral port number”, if the source host is _______
NTP
Echo
Server
Client
38. “Total length” field in UDP packet header is the length of _________
Only UDP header
Only data
Only checksum
UDP header plus data
39. Which is the correct expression for the length of UDP datagram?
UDP length = IP length – IP header’s length
UDP length = UDP length – UDP header’s length
UDP length = IP length + IP header’s length
UDP length = UDP length + UDP header’s length
40. The ______ field is used to detect errors over the entire user datagram.
udp header
checksum
source port
destination port
41. Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
AH transport mode
ESP transport mode
ESP tunnel mode
AH tunnel mode
42. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
Kerberos V5
SHA
MD5
Both SHA and MD5
43. Which two types of IPsec can be used to secure communications between two LANs?
AH tunnel mode
ESP tunnel mode
both AH tunnel mode and ESP tunnel mode
ESP transport mode
44. ______ provides authentication at the IP level.
AH
ESP
PGP
SSL
45. . IPsec defines two protocols: _______ and ________
AH; SSL
PGP; ESP
AH; ESP
PGP; SSL
46. IP Security operates in which layer of the OSI model?
Network
Transport
Application
Physical
47. ESP does not provide ________
source authentication
data integrity
privacy
error control
48. In computer security _______ means that computer system assets can be modified only by authorized parities.
confidentiality
integrity
availability
authenticity
49. In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.
confidentiality
integrity
availability
authenticity
50. Which of the following organizations is primarily concerned with military encryption systems?
NSA
NIST
IEEE
ITU
Submit