Networking :: All Aptitude Test ::

1.In TCP, sending and receiving data is done as ?
A. Stream of bytes
B. Sequence of characters
C. Lines of data
D. Stream of bytes

2. TCP process may not write and read data at the same speed. So we need for storage?
A. Packets
B. Buffers
C. Segments
D. Packets

3.TCP groups a number of bytes together into a packet called ?
A. Packet
B. Buffer
C. Segment
D. Packet

4.Communication offered by TCP is ?
A. Full-duplex
B. Half-duplex
C. Semi-duplex
D. Full-duplex

5.To achieve reliable transport in TCP, is used to check the safe and sound arrival of data?
A. Packet
B. Buffer
C. Segment
D. Packet

6.In segment header, sequence number and acknowledgement number fields refer to ?
A. Byte number
B. Buffer number
C. Segment number
D. Byte number

7.Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
A. 10000
B. 10001
C. 12001
D. 10000

8. Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________
A. Fixed number
B. Random sequence of 0’s and 1’s
C. One
D. Fixed number

9. The value of acknowledgement field in a segment defines _______
A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence number of the byte received previously

10.The receiver of the data controls the amount of data that are to be sent by the sender is referred to as ?
A. Flow control
B. Error control
C. Congestion control
D. Flow control

11.Size of TCP segment header ranges between?
A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 16 and 32 bytes

12. Connection establishment in TCP is done by which mechanism?
A. Flow control
B. Three-Way Handshaking
C. Forwarding
D. Flow control

13.The server program tells its TCP that it is ready to accept a connection. This process is called ?
A. Active open
B. Active close
C. Passive close
D. Active open

14.A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called?
A. Active open
B. Active close
C. Passive close
D. Active open

15.In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is?
A. Mutual open
B. Mutual Close
C. Simultaneous open
D. Mutual open

16. Which of the following is false with respect to UDP?
A. Connection-oriented
B. Unreliable
C. Transport layer protocol
D. Connection-oriented

17.Return value of the UDP port “Chargen” is?
A. String of characters
B. String of integers
C. Array of characters with integers
D. String of characters

18.Beyond IP, UDP provides additional services such as ?
A. Routing and switching
B. Sending and receiving of packets
C. Multiplexing and demultiplexing
D. Routing and switching

19.What is the main advantage of UDP?
A. More overload
B. Reliable
C. Low overhead
D. More overload

20. Port number used by Network Time Protocol (NTP) with UDP is ?
A. 161
B. 123
C. 162
D. 161

21. What is the header size of a UDP packet?
A. NTP
B. Echo
C. Server
D. NTP

22. “Total length” field in UDP packet header is the length of ?
A. Only UDP header
B. Only data
C. Only checksum
D. Only UDP header

23. Which is the correct expression for the length of UDP datagram?
A. UDP length = IP length – IP header’s length
B. UDP length = UDP length – UDP header’s length
C. UDP length = IP length + IP header’s length
D. UDP length = IP length – IP header’s length

24.. The field is used to detect errors over the entire user datagram?
A. udp header
B. checksum
C. source port
D. udp header

25. Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
A. AH transport mode
B. ESP transport mode
C. ESP tunnel mode
D. AH transport mode

26. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
A. Kerberos V5
B. SHA
C. MD5
D. Kerberos V5

27. Which two types of IPsec can be used to secure communications between two LANs?
A. AH tunnel mode
B. ESP tunnel mode
C. Both AH tunnel mode and ESP tunnel mode
D. AH tunnel mode

28. Provides authentication at the IP level?
A. AH
B. ESP
C. PGP
D. AH

29. IPsec defines two protocols: and ?
A. AH; SSL
B. PGP; ESP
C. AH; ESP
D. AH; SSL

30. IP Security operates in which layer of the OSI model?
A. Network
B. Transport
C. Application
D. Network


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers