R4RIN
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 14
Choose a topic to test your knowledge and improve your MCA skills
1. SONET stands for ____
synchronous optical network
synchronous operational network
stream optical network
shell operational network
2. In SONET, STS-1 level of electrical signalling has the data rate of _________
51.84 Mbps
155.52 Mbps
2488.320 Mbps
622.080 Mbps
3. The path layer of SONET is responsible for the movement of a signal _________
from its optical source to its optical destination
across a physical line
across a physical section
back to its optical source
4. The photonic layer of the SONET is similar to the __________ of OSI model.
network layer
data link layer
physical layer
Transport layer
5. In SONET, each synchronous transfer signal STS-n is composed of __________
2000 frames
4000 frames
8000 frames
16000 frames
6. Which one of the following is not true about SONET?
frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
multiplexing is synchronous TDM
all clocks in the network are locked to a master clock
STS-1 provides the data rate of 622.080Mbps
7. A linear SONET network can be ________
point-to-point
multi-point
both point-to-point and multi-point
single point
8. Automatic protection switching in linear network is defined at the _______
line layer
section layer
photonic layer
path layer
9. A unidirectional path switching ring is a network with __________
one ring
two rings
three rings
four rings
10. What is SDH?
sdh is similar standard to SONET developed by ITU-T
synchronous digital hierarchy
sdh stands for synchronous digital hierarchy and is a similar standard to SONET developed by ITU-T
none of the mentioned
11. Real-time transport protocol (RTP) is mostly used in ______
streaming media
video teleconference
television services
All of the mentioned
12. RTP is used to ________
carry the media stream
monitor transmission statistics of streams
monitor quality of service of streams
secure the stream
13. RTP provides the facility of jitter _______
media stream
expansion
media modification
Security
14. Which protocol provides the synchronization between media streams?
RTP
RTCP
RPC
RTCT
15. An RTP session is established for ______
each media stream
all media streams
some predefined number of media streams
no media stream
16. RTP can use ________
unprevileleged UDP ports
stream control transmission protocol
datagram congestion control protocol
All of the mentioned
17. Which one of the following multimedia formats can not be supported by RTP?
MPEG-4
MJPEG
MPEG
TXT
18. An RTP header has a minimum size of _________
12 bytes
16 bytes
24 bytes
32 bytes
19. Which one of the following is not correct?
RTCP provides canonical end-point identifiers to all session participants
RTCP reports are expected to be sent by all participants
RTCP itself does not provide any flow encryption or authentication methods
RTCP handles the actual data delivery
20. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
SRTP
RTCP
RCP
RTCT
21. An RPC (remote procedure call) is initiated by the _________
server
client
client after the sever
a third party
22. In RPC, while a server is processing the call, the client is blocked ________
unless the client sends an asynchronous request to the server
unless the call processing is complete
for the complete duration of the connection
unless the server is disconnected
23. A remote procedure call is _______
inter-process communication
a single process
a single thread
a single stream
24. RPC allows a computer program to cause a subroutine to execute in _________
its own address space
another address space
both its own address space and another address space
applications address space
25. RPC works between two processes. These processes must be _______
on the same computer
on different computers connected with a network
on the same computer and also on different computers connected with a network
on none of the computers
26. A remote procedure is uniquely identified by _________
program number
version number
procedure number
all of the mentioned
27. An RPC application requires _________
specific protocol for client server communication
a client program
a server program
all of the mentioned
28. RPC is used to ______
establish a server on remote machine that can respond to queries
retrieve information by calling a query
establish a server on remote machine that can respond to queries and retrieve information by calling a query
to secure the client
29. RPC is a _________
synchronous operation
asynchronous operation
time independent operation
channel specific operation
30. The local operating system on the server machine passes the incoming packets to the _______
server stub
client stub
client operating system
client process
31. Which of the following is an advantage of anomaly detection?
Rules are easy to define
Custom protocols can be easily analyzed
The engine can scale as the rule set grows
Malicious activity that falls within normal usage patterns is detected
32. A false positive can be defined as _____
An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
An alert that indicates nefarious activity on a system that is not running on the network
The lack of an alert for nefarious activity
Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity
33. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?
Inside the firewall
Outside the firewall
Both inside and outside the firewall
Neither inside the firewall nor outside the firewall.
34. What is the purpose of a shadow honeypot?
To flag attacks against known vulnerabilities
To help reduce false positives in a signature-based IDS
To randomly check suspicious traffic identified by an anomaly detection system
To enhance the accuracy of a traditional honeypot
35. At which two traffic layers do most commercial IDSes generate signatures?
Application layer and Network layer
Network layer and Session Layer
Transport layer and Application layer
Transport layer and Network layer
36. IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
Inspection of password files to detect inadvisable passwords
Mechanisms put in place to reenact known methods of attack and record system responses
Inspection of system to detect policy violations
Inspection of configuration files to detect inadvisable settings
37. When discussing IDS/IPS, what is a signature?
An electronic signature used to authenticate the identity of a user on the network
Attack-definition file
It refers to “normal,” baseline network behavior
It is used to authorize the users on a network
38. “Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?
Application layer and Transport layer
Network layer and Application layer
Session layer and Transport layer
Application layer and Session layer
39. Which of the following is used to provide a baseline measure for comparison of IDSes?
Crossover error rate
False negative rate
False positive rate
Bit error rate
40. Which of the following is true of signature-based IDSes?
They alert administrators to deviations from “normal” traffic behavior
They identify previously unknown attacks
The technology is mature and reliable enough to use on production networks
They scan network traffic or packets to identify matches with attack-definition files
41. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?
LCP
NCP
Both LCP and NCP
TCP
42. The PPP protocol ____
Is designed for simple links which transport packets between two peers
Is one of the protocols for making an Internet connection over a phone line
Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line
Is used for sharing bandwidth
43. PPP provides the _______ layer in the TCP/IP suite.
Link
Network
Transport
Application
44. PPP consists of ________components
Three (encapsulating, the Domain Name system)
Three (encapsulating, a link control protocol, NCP)
Two (a link control protocol, Simple Network Control protocol)
One (Simple Network Control protocol)
45. The PPP encapsulation _______
Provides for multiplexing of different network-layer protocols
Requires framing to indicate the beginning and end of the encapsulation
Establishing, configuring and testing the data-link connection
Provides interface for handling the capabilities of the connection/link on the network
46. A Link Control Protocol (LCP) is used for _____
Establishing, configuring and testing the data-link connection
Establishing and configuring different network-layer protocols
Testing the different network-layer protocols
Provides for multiplexing of different network-layer protocols
47. A family of network control protocols (NCPs) ______
Are a series of independently defined protocols that provide a dynamic
Are a series of independently-defined protocols that encapsulate
Are a series of independently defined protocols that provide transparent
The same as NFS
48. Choose the correct statement from the following.
PPP can terminate the link at any time
PPP can terminate the link only during the link establishment phase
PPP can terminate the link during the authentication phase
PPP can terminate the link during the callback control phase
49. The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.
Link-termination phase
Link establishment phase
Authentication phase
Link dead phase
50. EIGRP metric is ______
K-values
Bandwidth only
Hop Count
Delay only
Submit