Technical :: All Aptitude Test ::

Hassan
1. A port address in UDP is _______bits long.
A. 8
B. 16
C. 32
D. 8

2.Which of the following does UDP guarantee?
A. flow control
B. connection-oriented delivery
C. flow control
D. flow control

3. The source port address on the UDP user datagram header defines _______?
A. the sending computer
B. the receiving computer
C. the process running on the sending computer
D. the sending computer

4.The combination of an IP address and a port number is called a ____________?
A. transport address
B. network address
C. socket address
D. transport address

5.To use the services of UDP, we need ________ socket addresses:
A. four
B. two
C. three
D. four

6. UDP packets have a fixed-size header of _______ bytes:
A. 6
B. 8
C. 40
D. 6

7. UDP packets are encapsulated in __________?
A. an Ethernet frame
B. an TCP segment
C. an IP datagram
D. an Ethernet frame

8. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host?
A. flow control
B. multiplexing
C. demultiplexing
D. flow control

9.UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
A. flow control
B. multiplexing
C. demultiplexing
D. flow control

10.The value of the window size is determined by _______?
A. the sender
B. the receiver
C. both the sender and receiver
D. the sender

11.______ provides either authentication or encryption, or both, for packets at the IP level.?
A. AH
B. ESP
C. PGP
D. AH

12.One security protocol for the e-mail system is _________.?
A. IPSec
B. SSL
C. PGP
D. IPSec

13.IPSec defines two protocols: _______ and ________.?
A. AH; SSL
B. PGP; ESP
C. AH; ESP
D. AH; SSL

14.______ provides authentication at the IP level.?
A. AH
B. ESP
C. PGP
D. AH

15._____ is the protocol designed to create security associations, both inbound and outbound.?
A. SA
B. CA
C. KDC
D. SA

16.IKE creates SAs for ____?
A. SSL
B. PGP
C. IPSec
D. SSL

17.IKE uses _____?
A. Oakley
B. SKEME
C. ISAKMP
D. Oakley

18. A _______network is used inside an organization.?
A. private
B. public
C. semi-private
D. private

19. An ________ is a private network that uses the Internet model?
A. intranet
B. internet
C. extranet
D. intranet

20.A ______ provides privacy for LANs that must communicate through the global Internet.?
A. VPP
B. VNP
C. VNN
D. VPP

21. A _______ layer security protocol provides end-to-end security services for applications.?
A. data link
B. network
C. transport
D. data link

22.______ is actually an IETF version of ____?
A. TLS; TSS
B. SSL; TLS
C. TLS; SSL
D. TLS; TSS

23._____ provide security at the transport layer.?
A. SSL
B. TLS
C. either (a) or (b)
D. SSL

24.SSL provides _________?
A. message integrity
B. confidentiality
C. compression
D. message integrity

25.In _______, the cryptographic algorithms and secrets are sent with the message.?
A. IPSec
B. SSL
C. TLS
D. IPSec

26.One security protocol for the e-mail system is ________?
A. IPSec
B. PGP
C. SSL
D. IPSec

27.______ was invented by Phil Zimmerman.?
A. PGP
B. IPSec
C. SSL
D. PGP

28._________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.?
A. IPSec
B. PGP
C. SSL
D. IPSec

29. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.?
A. transport
B. tunnel
C. either (a) or (b)
D. transport

30.The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.?
A. tunnel
B. transport
C. either (a) or (b)
D. tunnel


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers