Choose a topic to test your knowledge and improve your MCA skills
SONET stands for ____
In SONET, STS-1 level of electrical signalling has the data rate of _________
The path layer of SONET is responsible for the movement of a signal _________
The photonic layer of the SONET is similar to the __________ of OSI model.
In SONET, each synchronous transfer signal STS-n is composed of __________
Which one of the following is not true about SONET?
A linear SONET network can be ________
Automatic protection switching in linear network is defined at the _______
A unidirectional path switching ring is a network with __________
What is SDH?
Real-time transport protocol (RTP) is mostly used in ______
RTP is used to ________
RTP provides the facility of jitter _______
Which protocol provides the synchronization between media streams?
An RTP session is established for ______
RTP can use ________
Which one of the following multimedia formats can not be supported by RTP?
An RTP header has a minimum size of _________
Which one of the following is not correct?
Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
An RPC (remote procedure call) is initiated by the _________
In RPC, while a server is processing the call, the client is blocked ________
A remote procedure call is _______
RPC allows a computer program to cause a subroutine to execute in _________
RPC works between two processes. These processes must be _______
A remote procedure is uniquely identified by _________
An RPC application requires _________
RPC is used to ______
RPC is a _________
The local operating system on the server machine passes the incoming packets to the _______
Which of the following is an advantage of anomaly detection?
A false positive can be defined as _____
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?
What is the purpose of a shadow honeypot?
At which two traffic layers do most commercial IDSes generate signatures?
IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
When discussing IDS/IPS, what is a signature?
“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?
Which of the following is used to provide a baseline measure for comparison of IDSes?
Which of the following is true of signature-based IDSes?
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?
The PPP protocol ____
PPP provides the _______ layer in the TCP/IP suite.
PPP consists of ________components
The PPP encapsulation _______
A Link Control Protocol (LCP) is used for _____
A family of network control protocols (NCPs) ______
Choose the correct statement from the following.
The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.
EIGRP metric is ______