MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 14

Choose a topic to test your knowledge and improve your MCA skills

1. SONET stands for ____




2. In SONET, STS-1 level of electrical signalling has the data rate of _________




3. The path layer of SONET is responsible for the movement of a signal _________




4. The photonic layer of the SONET is similar to the __________ of OSI model.




5. In SONET, each synchronous transfer signal STS-n is composed of __________




6. Which one of the following is not true about SONET?




7. A linear SONET network can be ________




8. Automatic protection switching in linear network is defined at the _______




9. A unidirectional path switching ring is a network with __________




10. What is SDH?




11. Real-time transport protocol (RTP) is mostly used in ______




12. RTP is used to ________




13. RTP provides the facility of jitter _______




14. Which protocol provides the synchronization between media streams?




15. An RTP session is established for ______




16. RTP can use ________




17. Which one of the following multimedia formats can not be supported by RTP?




18. An RTP header has a minimum size of _________




19. Which one of the following is not correct?




20. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?




21. An RPC (remote procedure call) is initiated by the _________




22. In RPC, while a server is processing the call, the client is blocked ________




23. A remote procedure call is _______




24. RPC allows a computer program to cause a subroutine to execute in _________




25. RPC works between two processes. These processes must be _______




26. A remote procedure is uniquely identified by _________




27. An RPC application requires _________




28. RPC is used to ______




29. RPC is a _________




30. The local operating system on the server machine passes the incoming packets to the _______




31. Which of the following is an advantage of anomaly detection?




32. A false positive can be defined as _____




33. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?




34. What is the purpose of a shadow honeypot?




35. At which two traffic layers do most commercial IDSes generate signatures?




36. IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?




37. When discussing IDS/IPS, what is a signature?




38. “Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?




39. Which of the following is used to provide a baseline measure for comparison of IDSes?




40. Which of the following is true of signature-based IDSes?




41. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?




42. The PPP protocol ____




43. PPP provides the _______ layer in the TCP/IP suite.




44. PPP consists of ________components




45. The PPP encapsulation _______




46. A Link Control Protocol (LCP) is used for _____




47. A family of network control protocols (NCPs) ______




48. Choose the correct statement from the following.




49. The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.




50. EIGRP metric is ______