Technical :: All Aptitude Test ::

Hassan
1.Size of TCP segment header ranges between?
A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 16 and 32 bytes

2. Connection establishment in TCP is done by which mechanism?
A. Flow control
B. Three-Way Handshaking
C. Forwarding
D. Flow control

3.The server program tells its TCP that it is ready to accept a connection. This process is called ?
A. Active open
B. Active close
C. Passive close
D. Active open

4.A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called?
A. Active open
B. Active close
C. Passive close
D. Active open

5.In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is?
A. Mutual open
B. Mutual Close
C. Simultaneous open
D. Mutual open

6. Which of the following is false with respect to UDP?
A. Connection-oriented
B. Unreliable
C. Transport layer protocol
D. Connection-oriented

7.Return value of the UDP port “Chargen” is?
A. String of characters
B. String of integers
C. Array of characters with integers
D. String of characters

8.Beyond IP, UDP provides additional services such as ?
A. Routing and switching
B. Sending and receiving of packets
C. Multiplexing and demultiplexing
D. Routing and switching

9.What is the main advantage of UDP?
A. More overload
B. Reliable
C. Low overhead
D. More overload

10. Port number used by Network Time Protocol (NTP) with UDP is ?
A. 161
B. 123
C. 162
D. 161

11. What is the header size of a UDP packet?
A. NTP
B. Echo
C. Server
D. NTP

12. “Total length” field in UDP packet header is the length of ?
A. Only UDP header
B. Only data
C. Only checksum
D. Only UDP header

13. Which is the correct expression for the length of UDP datagram?
A. UDP length = IP length – IP header’s length
B. UDP length = UDP length – UDP header’s length
C. UDP length = IP length + IP header’s length
D. UDP length = IP length – IP header’s length

14.. The field is used to detect errors over the entire user datagram?
A. udp header
B. checksum
C. source port
D. udp header

15. Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
A. AH transport mode
B. ESP transport mode
C. ESP tunnel mode
D. AH transport mode

16. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
A. Kerberos V5
B. SHA
C. MD5
D. Kerberos V5

17. Which two types of IPsec can be used to secure communications between two LANs?
A. AH tunnel mode
B. ESP tunnel mode
C. Both AH tunnel mode and ESP tunnel mode
D. AH tunnel mode

18. Provides authentication at the IP level?
A. AH
B. ESP
C. PGP
D. AH

19. IPsec defines two protocols: and ?
A. AH; SSL
B. PGP; ESP
C. AH; ESP
D. AH; SSL

20. IP Security operates in which layer of the OSI model?
A. Network
B. Transport
C. Application
D. Network

21. ESP does not provide ?
A. source authentication
B. data integrity
C. privacy
D. source authentication

22. In computer security means that computer system assets can be modified only by authorized parities?
A. confidentiality
B. integrity
C. availability
D. confidentiality

23. In computer security means that the information in a computer system only be accessible for reading by authorized parities?
A. confidentiality
B. integrity
C. availability
D. confidentiality

24. Which of the following organizations is primarily concerned with military encryption systems?
A. NSA
B. NIST
C. IEEE
D. NSA

25.Which is not a application layer protocol?
A. HTTP
B. SMTP
C. FTP
D. HTTP

26.The packet of information at the application layer is called ?
A. Packet
B. Message
C. Segment
D. Packet

27.Which one of the following is an architecture paradigms?
A. Peer to peer
B. Client-server
C. HTTP
D. Peer to peer

28. Application developer has permission to decide the following on transport layer side?
A. Transport layer protocol
B. Maximum buffer size
C. Both Transport layer protocol and Maximum buffer size
D. Transport layer protocol

29. Application layer offers service?
A. End to end
B. Process to process
C. Both End to end and Process to process
D. End to end

30. E-mail is ?
A. Loss-tolerant application
B. Bandwidth-sensitive application
C. Elastic application
D. Loss-tolerant application


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers