Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Forouzan: MCQ in B) multipoint D) Transmission B) half-duplex

Introduction to Data C) point-to-point 9. ________ defines how a C) full-duplex


Communications and D) secondary particular pattern to be D) all of the above
Networking 5. Which topology requires interpreted, and what 13. _______ are special-
1. There are a multipoint connection? action is to be taken based interest groups that quickly
______________ Internet A) Bus on that interpretation. test, evaluate, and
service providers. B) Star A) Syntax standardize new
A) regional C) Mesh B) Semantics technologies.
B) local D) Ring C) Timing A) Standards organizations
C) national and 6. A ________ is a set of D) None of the above B) Regulatory agencies
international rules that governs data C) Forums
D) all of the above communication. 10. Frequency of failure D) All of the above
2. ______ refers to the A) protocol and network recovery time 14. Which agency
physical or logical B) forum after a failure are measures developed standards for
arrangement of a network. C) standard of the _______of a physical connection
A) Topology D) none of the above network. interfaces and electronic
B) Mode of operation 7. In a ______ connection, A) Performance signaling specifications?
C) Data flow two and only two devices B) Security A) ISO
D) None of the above are connected by a C) Reliability B) ITU-T
3. A ______ is a data dedicated link. D) Feasibility C) ANSI
communication system A) multipoint 11. A television broadcast D) EIA
spanning states, countries, B) point-to-point is an example of _______ 15. A _______ is a data
or the whole world. C) (a) and (b) transmission. communication system
A) MAN D) none of the above A) half-duplex within a building, plant, or
B) WAN 8. The information to be B) simplex campus, or between
C) LAN communicated in a data C) full-duplex nearby buildings.
D) none of the above communications system is D) automatic A) LAN
4. A _______ connection the _______. 12. Data flow between two B) MAN
provides a dedicated link A) Medium devices can occur in a C) WAN
between two devices. B) Protocol _______ way. D) none of the above
A) primary C) Message A) simplex
16. _______ refers to two A) A WAN ______________ data, meaning the order in
characteristics: when data B) An internet transmission. which they are presented.
should be sent and how C) A LAN A) simplex A) Semantics
fast it can be sent. D) None of the above B) half-duplex B) Syntax
A) Semantics 21. In a ________ C) full-duplex C) Timing
B) Timing connection, three or more D) automatic D) All of the above
C) Syntax devices share a link. 25. Which topology 29. An unauthorized user is
D) none of the above A) point-to-point requires a central a network _______ issue.
17. This was the first B) multipoint controller or hub? A) Security
network. C) (a) and (b) A) Mesh B) Reliability
A) CSNET D) none of the above B) Bus C) Performance
B) NSFNET 22. Which organization has C) Star D) All the above
C) ARPANET authority over interstate D) Ring 30. ________ is an idea or
D) ANSNET and international 26. The _______ is the concept that is a precursor
18. Devices may be commerce in the physical path over which a to an Internet standard.
arranged in a _____ communications field? message travels. A) RCF
topology. A) FCC A) Protocol B) ID
A) mesh B) IEEE B) Signal C) RFC
B) ring C) ITU-T C) Medium D) none of the above
C) bus D) ISOC D) All the above 31. In _______
D) all of the above 23. In the original 27. In a _______ transmission, the channel
19. _______ is the protocol ARPANET, _______ were connection, more than two capacity is shared by both
suite for the current directly connected devices can share a single communicating devices at
Internet. together. link. all times.
A) UNIX A) routers A) multipoint A) simplex
B) NCP B) host computers B) point-to-point B) half-duplex
C) TCP/IP C) networks C) primary C) full-duplex
D) ACM D) IMPs D) secondary D) half-simplex
20. ________ is a collection 24. Communication 28. _______ refers to the
of many separate between a computer and a structure or format of the Forouzan: MCQ in
networks. keyboard involves Network Models Set 1
1. The ______ layer adds a C) ARP A) user C) both a and b
header to the packet D) none of the above B) network D) none of the above
coming from the upper 5. The process-to-process C) both (a) and (b) 13. The _______ layer links
layer that includes the delivery of the entire D) neither (a) nor (b) the network support layers
logical addresses of the message is the 9. The physical, data link, and the user support
sender and receiver. responsibility of the and network layers are the layers.
A) data link _______ layer. ______ support layers. A) session
B) network A) Transport A) network B) transport
C) physical B) Application B) user C) data link
D) none of the above C) Physical C) both (a) and (b) D) network
2. Which of the following is D) Network D) neither (a) nor (b) 14. ICMPv6 includes
an application layer 6. The ______ layer is 10. The ________ layer is _______.
service? responsible for moving responsible for the A) IGMP
A) File transfer and access frames from one hop process-to-process delivery B) ARP
B) Mail service (node) to the next. of the entire message. C) RARP
C) Remote log-in A) transport A) transport D) a and b
D) All the above B) data link B) physical 15. The ____ address
3. When data are C) physical C) network uniquely defines a host on
transmitted from device A D) none of the above D) data link the Internet.
to device B, the header 7. The _______ layer is 11. The _______ layer lies A) IP
from A’s layer 4 is read by responsible for delivering between the network layer B) port
B’s _______ layer. data units from one station and the application layer. C) specific
A) Transport to the next without errors. A) Data link D) physical
B) Application A) physical B) Transport 16. The _______ layer
C) Physical B) data link C) Physical coordinates the functions
D) None of the above C) transport D) None of the above required to transmit a bit
4. __________ provides full D) network 12. The Internetworking stream over a physical
transport layer services to 8. The session, Protocol (IP) is a ________ medium.
applications. presentation, and protocol. A) data link
A) UDP application layers are the A) connection-oriented B) transport
B) TCP ____ support layers. B) reliable C) network
D) physical C) Data link Forouzan: MCQ in movement of _______
17. The ______ layer is D) None of the above Network Models Set 2 over the physical medium.
responsible for the source- 21. IPv6 has _______ -bit 25. The TCP/IP _______ A) dialogs
to-destination delivery of a addresses. layer is equivalent to the B) protocols
packet across multiple A) 128 combined session, C) bits
network links. B) 32 presentation, and D) programs
A) network C) 64 application layers of the 29. To deliver a message to
B) physical D) variable OSI model. the correct application
C) data link 22. The_____ address A) data link program running on a host,
D) transport identifies a process on a B) network the _______ address must
18. Mail services are host. C) physical be consulted.
available to network users A) specific D) application A) physical
through the _______ layer. B) port 26. When a host on B) port
A) Transport C) IP network A sends a message C) IP
B) Physical D) physical to a host on network B, D) none of the above
C) Data link 23. The_________ layer is which address does the 30. Ethernet uses a ______
D) Application responsible for the delivery router look at? physical address that is
19. The ____ created a of a message from one A) logical imprinted on the network
model called the Open process to another. B) physical interface card (NIC).
Systems Interconnection, A) transport C) port A) 32-bit
which allows diverse B) network D) none of the above B) 6-byte
systems to communicate. C) physical 27. As the data packet C) 64-bit
A) IEEE D) none of the above moves from the upper to D) none of the above
B) ISO 24. The _________ layer the lower layers, headers 31. The _______ layer is
C) OSI enables the users to access are _______. the layer closest to the
D) none of the above the network. A) Rearranged transmission medium.
20. The _______ layer A) application B) Removed A) Network
changes bits into B) physical C) Added B) Transport
electromagnetic signals. C) data link D) Modified C) Physical
A) Physical D) transport 28. The physical layer is D) Data link
B) Transport concerned with the
32. The OSI model consists C) Manufacturers disliked 39. The Internet model interactions between
of _______ layers. the TCP/IP protocol suite. consists of _______ layers. communicating devices.
A) eight D) None of the above A) Eight A) session
B) seven 36. In the OSI model, as a B) Seven B) physical
C) five data packet moves from C) Five C) transport
D) three the lower to the upper D) Three D) network
33. The ________ address, layers, headers are 40. In the OSI model, what 43. A port address in
also known as the link _______. is the main function of the TCP/IP is ______ bits long.
address, is the address of a A) removed transport layer? A) 16
node as defined by its LAN B) added A) process-to-process B) 32
or WAN. C) rearranged message delivery C) 48
A) IP D) modified B) node-to-node delivery D) none of the above
B) port 37. In the OSI model, when C) synchronization 44. In the OSI model,
C) specific data is transmitted from D) updating and encryption and decryption
D) physical device A to device B, the maintenance of routing are functions of the
34. Layer 2 lies between header from A’s layer 5 is tables ________ layer.
the physical layer and the read by B’s _______ layer. 41. _______ is a process- A) application
_______ layer. A) session to-process protocol that B) presentation
A) Data link B) physical adds only port addresses, C) session
B) Transport C) transport checksum error control, D) transport
C) Network D) presentation and length information to 45. TCP/IP is a ______
D) None of the above 38. The seven-layer _____ the data from the upper hierarchical protocol suite
35. Why was the OSI model model provides guidelines layer. developed ____ the OSI
developed? for the development of A) IP model.
A) The rate of data universally compatible B) TCP A) five-layer; before
transfer was increasing networking protocols. C) UDP B) six-layer; before
exponentially A) ISO D) none of the above C) seven-layer; before
B) Standards were needed B) OSI 42. The ______ layer D) five-layer; after
to allow any two systems C) IEEE establishes, maintains, and 46. The ________ address,
to communicate D) none of the above synchronizes the also known as the link
address, is the address of a
node as defined by its LAN B) two’s complement C) Hamming distance D) Two-dimensional parity
or WAN. arithmetic D) none of the above check
A) logical C) either (a) or (b) 6. The _______ of a 10. In _____ coding, we
B) port D) none of the above polynomial is the highest divide our message into
C) physical 2. The checksum of 1111 power in the polynomial. blocks, each of k bits,
D) none of the above and 1111 is _________. A) range called ___.
47. The _______ model A) 0000 B) power A) block; blockwords
shows how the network B) 1111 C) degree B) block; datawords
functions of a computer C) 1110 D) none of the above C) linear; datawords
ought to be organized. D) 0111 7. In modulo-2 arithmetic, D) none of the above
A) ANSI 3. In modulo-11 arithmetic, __________ give the same 11. A _____ error means
B) CCITT we use only the integers in results. that two or more bits in the
C) ISO the range ______, A) addition and data unit have changed.
D) OSI inclusive. subtraction A) burst
48. The _______ layer A) 1 to 10 B) addition and B) double-bit
ensures interoperability B) 0 to 10 multiplication C) single-bit
between communicating C) 1 to 11 C) addition and division D) none of the above
devices through D) none of the above D) none of the above 12. Adding 1 and 1 in
transformation of data into 4. In cyclic redundancy 8. In cyclic redundancy modulo-2 arithmetic
a mutually agreed upon checking, the divisor is checking, what is the CRC? results in _________.
format. _______ the CRC. A) The quotient A) 0
A) network A) one bit less than B) The dividend B) 1
B) presentation B) one bit more than C) The divisor C) 2
C) transport C) The same size as D) The remainder D) none of the above
D) data link D) none of the above 9. Which error detection 13. In ________ error
Forouzan: MCQ in Error 5. The ________ between method consists of just one correction, the receiver
Detection and Correction two words is the number of redundant bit per data corrects errors without
1. Checksums use differences between unit? requesting retransmission.
_________ arithmetic. corresponding bits. A) CRC A) onward
A) one’s complement A) Hamming rule B) Checksum B) forward
arithmetic B) Hamming code C) Simple parity check C) backward
D) none of the above C) ORing B) 6 D) none of the above
14. If the Hamming D) none of the above C) 5 26. In block coding, if n = 5,
distance between a 18. In ________ error D) none of the above the maximum Hamming
dataword and the correction, the receiver 22. The _____of errors is distance between two
corresponding codeword is asks the sender to send the more difficult than the codewords is ________.
three, there are _____ bits data again. ______. A) 5
in error. A) forward A) detection; correction B) 3
A) 5 B) backward B) correction; detection C) 2
B) 4 C) retransmission C) creation; correction D) none of the above
C) 3 D) none of the above D) creation; detection 27. Which error detection
D) none of the above 19. We can divide coding 23. In block coding, if k = 2 method uses one’s
15. A simple parity-check schemes into two broad and n = 3, we have complement arithmetic?
code can detect categories: ________ and _______ invalid A) Checksum
__________ errors. ______coding. codewords. B) CRC
A) an odd-number of A) linear; nonlinear A) 4 C) Simple parity check
B) an even-number of B) block; convolution B) 8 D) Two-dimensional parity
C) two C) block; linear C) 2 check
D) no errors D) none of the above D) none of the above 28. The divisor in a cyclic
16. The Hamming distance 20. In modulo-2 arithmetic, 24. The checksum of 0000 code is normally called the
between equal codewords we use only ______. and 0000 is __________. _________.
is _________. A) 1 and 2 A) 0000 A) redundancy
A) 0 B) 0 and 1 B) 1111 B) degree
B) 1 C) 0 and 2 C) 0111 C) generator
C) n D) none of the above D) 1110 D) none of the above
D) none of the above 21. To guarantee 25. In one’s complement 29. In modulo-2 arithmetic,
17. In a linear block code, correction of up to 5 errors arithmetic, if positive 7 is we use the ______
the _______ of any two in all cases, the minimum 0111, then negative 7 is operation for both addition
valid codewords creates Hamming distance in a ________. and subtraction.
another valid codeword. block code must be A) 1101 A) OR
A) ANDing ________. B) 1000 B) XOR
B) XORing A) 11 C) 1111 C) AND
D) none of the above a codeword is rotated, the B) 7 6. HDLC is an acronym for
30. We add r redundant result is another codeword. C) 5 _______.
bits to each block to make A) Convolution D) any of the above A) Half-duplex digital link
the length n = k + r. The B) Cyclic 3. The Stop-And-Wait ARQ, combination
resulting n-bit blocks are C) Non-linear Go-Back-N ARQ, and the B) Host double-level
called _________. D) none of the above Selective Repeat ARQ are circuit
A) codewords 34. The Hamming distance for ______ channels. C) High-duplex line
B) datawords between 100 and 001 is A) noiseless communication
C) blockwords ________. B) noisy D) High-level data link
D) none of the above A) 0 C) either (a) or (b) control
31. To guarantee the B) 1 D) neither (a) nor (b) 7. In Selective Repeat ARQ,
detection of up to 5 errors C) 2 4. The _________Protocol, if 5 is the number of bits
in all cases, the minimum D) none of the above adds a simple error control for the sequence number,
Hamming distance in a Forouzan: MCQ in Data mechanism to the then the maximum size of
block code must be Link Control _______Protocol. the receive window must
_______. 1. In Go-Back-N ARQ, if 5 is A) Selective Repeat ARQ; be _____.
A) 11 the number of bits for the Go-Back-N ARQ A) 1
B) 5 sequence number, then B) Go-Back-N ARQ; Stop- B) 15
C) 6 the maximum size of the and-Wait C) 16
D) none of the above receive window must be C) Stop-and-Wait ARQ; D) 31
32. A generator that _______. Stop-and-Wait 8. In Go-Back-N ARQ, if 5 is
contains a factor of ____ A) 1 D) none of the above the number of bits for the
can detect all odd- B) 15 5. In PPP, the ________ is sequence number, then
numbered errors. C) 16 responsible for the maximum size of the
A) x D) 31 establishing, maintaining, send window must be
B) 1 2. In Go-Back-N ARQ, if configuring, and _____.
C) x + 1 frames 4, 5, and 6 are terminating links. A) 1
D) none of the above received successfully, the A) PAP B) 15
33. _______codes are receiver may send an ACK B) CHAP C) 16
special linear block codes _______ to the sender. C) LCP D) 31
with one extra property. If A) 6 D) NCP
9. In Stop-and-Wait ARQ, 12. In the Go-Back-N 16. In _________, the Protocol (PPP), which is a
the acknowledgment Protocol, if the size of the configuration is balanced. _________protocol.
number always announces sequence number field is 8, The link is point-to-point, A) byte-oriented
in ______ arithmetic the the sequence numbers are and each station can B) bit-oriented
sequence number of the in ________ arithmetic, function as a primary and a C) character-oriented
next frame expected. A) modulo-256 secondary. D) none of the above
A) modulo-m B) modulo- 8 A) ARM 20. For Stop-and-Wait ARQ,
B) modulo-2 C) modulo-2 B) ABM for 10 data packets sent,
C) modulo-4 D) none of the above C) NBM _______ acknowledgments
D) none of the above 13. ______ control refers D) NRM are needed.
10. In Selective Repeat to methods of error 17. Byte stuffing means A) less than 10
ARQ, if 5 is the number of detection and correction. adding a special byte to the B) more than 10
bits for the sequence A) Flow data section of the frame C) exactly 10
number, then the B) Error when there is a character D) none of the above
maximum size of the send C) Transmission with the same pattern as 21. _________framing uses
window must be _____. D) none of the above the ______. two categories of
A) 1 14. In a Go-Back-N ARQ, if A) trailer protocols: character-
B) 15 the window size is 63, what B) flag oriented and bit-oriented.
C) 16 is the range of sequence C) header A) Standard
D) 31 numbers? D) none of the above B) Fixed-size
11. _______ control refers A) 1 to 63 18. The ______ Protocol C) Variable-size
to a set of procedures used B) 1 to 64 has neither flow nor error D) None of the above
to restrict the amount of C) 0 to 63 control. 22. _______ control refers
data that the sender can D) 0 to 64 A) Selective-Repeat ARQ to a set of procedures used
send before waiting for 15. Both Go-Back-N and B) Go-Back-N ARQ to restrict the amount of
acknowledgment. Selective-Repeat Protocols C) Stop-and-Wait data that the sender can
A) Flow use a _________. D) Simplest send before waiting for
B) Error A) sliding window 19. The most common acknowledgment.
C) Transmission B) sliding frame protocol for point-to-point A) Flow
D) none of the above C) sliding packet access is the Point-to-Point B) Error
D) none of the above C) Transmission
D) none of the above C) NRM when there is a sequence D) Go-Back-N ARQ
23. In a ________ protocol, D) ABM of bits with the same 34. In Stop-and-Wait ARQ,
the data section of a frame 27. In a _________ pattern as the ________. we use sequence numbers
is a sequence of characters. protocol, the data section A) trailer to number the frames. The
A) bit-oriented of a frame is a sequence of B) flag sequence numbers are
B) character-oriented bits. C) header based on
C) either (a) or (b) A) bit-oriented D) none of the above __________arithmetic.
D) none of the above B) byte-oriented 31. In the A) modulo-m
24. In _______ framing, C) either (a) or (b) _________Protocol, if no B) modulo-2
there is no need for D) none of the above acknowledgment for a C) modulo-4
defining the boundaries of 28. In ________ framing, frame has arrived, we D) none of the above
frames. we need a delimiter (flag) resend all outstanding 35. In the _____ Protocol,
A) standard to define the boundary of frames. the sender sends its frames
B) fixed-size two frames. A) Go-Back-N ARQ one after another with no
C) variable-size A) standard B) Selective-Repeat ARQ regard to the receiver.
D) none of the above B) fixed-size C) Stop-and-Wait ARQ A) Simplest
25. The _______Protocol C) variable-size D) none of the above B) Selective-Repeat ARQ
has both flow control and D) none of the above 32. The Simplest Protocol C) Stop-and-Wait
error control. 29. High-level Data Link and the Stop-and-Wait D) Go-Back-N ARQ
A) Stop-and-Wait Control (HDLC) is a Protocol are for ______ 36. _________control in
B) Selective-Repeat ARQ _______ protocol for channels. the data link layer is based
C) Go-Back-N ARQ communication over point- A) noiseless on automatic repeat
D) both (b) and (c) to-point and multipoint B) noisy request, which is the
26. In _________, the links. C) either (a) or (b) retransmission of data.
station configuration is A) byte-oriented D) neither (a) nor (b) A) Flow
unbalanced. We have one B) bit-oriented 33. The _______Protocol B) Error
primary station and C) character-oriented has flow control, but not C) Transmission
multiple secondary D) none of the above error control. D) none of the above
stations. 30. Bit stuffing means A) Selective-Repeat ARQ 37. In PPP, _______ is a
A) ARM adding an extra 0 to the B) Stop-and-Wait three-way hand-shaking
B) NBM data section of the frame C) Simplest authentication protocol in
which the password is kept C) character-oriented; bit 44. _______ in the data Forouzan: MCQ in
secret; it is never sent stuffing link layer separates a Connecting LANs,
online. D) none of the above message from one source Backbone Networks, and
A) PAP 41. In the _____ Protocol, to a destination, or from Virtual LANs
B) LCP the sender sends one other messages going from 1. VLANs create _________
C) NCP frame, stops until it other sources to other domains.
D) CHAP receives confirmation from destinations. A) multicast
38. In PPP, ________ is a the receiver, and then A) Controlling B) broadcast
simple authentication sends the next frame. B) Framing C) unicast
procedure with a two-step A) Simplest C) Digitizing D) none of the above
process: B) Stop-and-Wait D) none of the above 2. A ________ operates in
A) CHAP C) Selective-Repeat ARQ 45. Data link control deals both the physical and
B) PAP D) Go-Back-N ARQ with the design and the data link layer.
C) LCP 42. Stop-and-Wait ARQ is a procedures for ______ A) router
D) NCP special case of Go-Back-N communication. B) bridge
39. In the _________ ARQ in which the size of A) node-to-node C) repeater
protocol we avoid the send window is ___. B) process-to-process D) passive hub
unnecessary transmission A) 1 C) host-to-host 3. A _______ is a device
by sending only frames B) 2 D) none of the above that operates only in the
that are corrupted. C) 8 46. In _________ physical layer.
A) Selective-Repeat ARQ D) none of the above protocols, we use A) bridge
B) Stop-and-Wait ARQ 43. ARQ stands for ________. B) router
C) Go-Back-N ARQ _______. A) bit-oriented; character C) passive hub
D) none of the above A) Acknowledge repeat stuffing D) repeater
40. In ________ protocols, request B) character-oriented; bit 4. A ______ switch is a
we use ________. B) Automatic stuffing faster and more
A) byte-oriented; bit retransmission request C) character-oriented; sophisticated router.
stuffing C) Automatic repeat byte stuffing A) two-layer
B) bit-oriented; bit quantization D) none of the above B) four-layer
stuffing D) Automatic repeat C) three-layer
request D) none of the above
5. _________ is just a D) none of the above D) none of the above C) simple
connector. 9. In a(n) _______ 13. ________ is actually D) none of the above
A) A passive hub configuration, the a multiport repeater. It is 17. A virtual local area
B) An active hub administrator types the normally used to create network (VLAN) is
C) either (a) or (b) port numbers, the IP connections between configured by _________.
D) neither (a) nor (b) addresses, or other stations in a physical star A) hardware
6. A ______ normally characteristics, using the topology. B) physical wiring
connects LANs and WANs VLAN software. A) A passive hub C) software
in the Internet and has a A) automatic B) An active hub D) none of the above
table that is used for B) manual C) either (a) or (b) 18. A ________ is normally
making decisions about the C) semiautomatic D) neither (a) nor (b) a computer that operates
route. D) none of the above 14. In a _____ backbone, in all five layers of the
A) router 10. A _______ LAN allows the backbone is just one Internet model or seven
B) bridge several LANs to be switch. layers of OSI model.
C) repeater connected. A) star A) gateway
D) none of the above A) wired B) bus B) router
7. A repeater is a B) wireless C) ring C) bridge
connecting device that C) backbone D) none of the above D) repeater
operates in the _______ D) none of the above 15. A spanning tree is a 19. A ________ is a device
layer of the Internet model. 11. A backbone is usually a graph in which there is no in which the stations are
A) network ______. _____. completely unaware of its
B) data link A) star A) arc existence.
C) physical B) bus B) loop A) simple bridge
D) all of the above C) either (a) or (b) C) node B) transparent bridge
8. A _______ regenerates a D) neither (a) nor (b) D) branch C) passive hub
signal, connects segments 12. A bridge can use the 16. A ________ bridge can D) repeater
of a LAN, and has no _________ algorithm to forward and filter frames 20. A ______ has a table
filtering capability. create a loopless topology. and automatically build its used in filtering decisions.
A) router A) multiway tree forwarding table. A) bridge
B) repeater B) binary tree A) dual B) passive hub
C) bridge C) spanning tree B) transparent C) repeater
D) none of the above D) repeater defined by the 32. A _____ can be used as
21. In a star-topology 25. A _______ is a administrator. a connecting device
Ethernet LAN, _______ is connecting device that A) automatic between two
just a point where the operates in the physical B) semiautomatic internetworks that use
signals coming from and data link layers of the C) manual different models.
different stations collide; it Internet model. D) none of the above A) gateway
is the collision point. A) router 29. IEEE 802.1d B) router
A) A passive hub B) repeater specification, defines C) bridge
B) An active hub C) bridge _________ criteria for a D) repeater
C) either (a) or (b) D) none of the above transparent bridges. 33. Membership in a VLAN
D) neither (a) nor (b) 26. A _______ can check A) two can be based on
22. VLANs can_________. the MAC addresses B) four _________.
A) provide an extra contained in the frame. C) three A) MAC addresses
measure of security A) repeater D) none of the above B) IP addresses
B) reduce network traffic B) bridge 30. A two-layer switch is a C) port numbers
C) either (a) or (b) C) router ______. D) all of the above
D) both (a) and (b) D) passive hub A) router 34. A ________receives a
23. A ________ link acts as 27. ________ is part of the B) repeater signal and, before it
a LAN in a remote media; its location in the C) bridge becomes too weak or
backbone connected by Internet model is below D) none of the above corrupted, regenerates the
remote bridges. the physical layer. 31. In a bridged LAN, the original bit pattern. It then
A) multidrop A) A passive hub _______ algorithm creates sends the refreshed signal.
B) point-to-point B) An active hub a topology in which each A) router
C) multipoint C) either (a) or (b) LAN can be reached from B) bridge
D) none of the above D) neither (a) nor (b) any other LAN through one C) repeater
24. A __________ forwards 28. In a(n) _____ path only. D) passive hub
every frame; it has no configuration, the stations A) binary tree 35. In a(n) ______
filtering capability. are automatically B) spanning tree configuration, the
A) router connected or disconnected C) unary tree initializing is done
B) bridge from a VLAN using criteria D) none of the above manually, with migrations
C) passive hub done automatically.
A) automatic Forouzan: MCQ in C) a or b C) broadcasting
B) semiautomatic Network Layer: Delivery, D) none of the above D) none of the above
C) manual Forwarding and Routing 5. RPF guarantees that 9. __________ is an
D) none of the above 1. In _______ delivery, the each network receives only implementation of
36. A _______ is a three- deliverer of the IP packet ____ of the multicast multicast distance vector
layer device that handles and the destination are on packet. routing. It is a source-based
packets based on their different networks. A) one copy routing protocol, based on
logical addresses. A) a connection-oriented B) two copies RIP.
A) router B) a direct C) a or b A) MOSPF
B) repeater C) an indirect D) none of the above B) DVMRP
C) bridge D) none of the above 6. Routing between C) CBT
D) none of the above 2. The input and output autonomous systems is D) none of the above
37. A three-layer switch is a ports of a router perform referred to as 10. In multicast routing,
kind of ________. the ________ layer ____________. each involved router needs
A) bridge functions of the router. A) interdomain routing to construct a ________
B) router A) physical and data link B) intradomain routing path tree for each group.
C) repeater B) network C) both a and b A) average
D) none of the above C) transport D) none of the above B) longest
38. Some new two-layer D) none of the above 7. DVMRP is a C) shortest
switches, called _______ 3. _________ broadcasts ________routing protocol, D) none of the above
switches, have been packets, but creates loops based on RIP. 11. In ________, the
designed to forward the in the systems. A) source-based multicast packet must
frame as soon as they A) Forwarding B) group-shared reach only those networks
check the MAC addresses B) Flooding C) both a and b that have active members
in the header of the frame. C) Backwarding D) none of the above for that particular group.
A) come-through D) none of the above 8. In _______, the router A) RPF
B) go-through 4. CBT is a ________ may forward the received B) RPB
C) cut-through protocol that uses a core as packet through several of C) RPM
D) none of the above the root of the tree. its interfaces. D) none of the above
A) source-based A) unicasting 12. In ________, each node
B) group-shared B) multicasting maintains a vector (table)
of minimum distances to C) broadcasting; B) multicast D) none of the above
every node. multicasting C) broadcast 24. In _______ forwarding,
A) path vector D) none of the above D) none of the above the full IP address of a
B) distance vector 16. MOSPF is a _______ 20. For purposes of destination is given in the
C) link state protocol. routing, the Internet is routing table.
D) none of the above A) data-driven divided into ___________. A) next-hop
13. A _______ message B) command-driven A) wide area networks B) network-specific
tells an upstream router to C) both a and b B) autonomous networks C) host-specific
start sending multicast D) none of the above C) autonomous systems D) default
messages for a specific 17. RPB creates a shortest D) none of the above 25. The Routing
group through a specific path _______ tree from 21. The metric used by Information Protocol (RIP)
router. the source to each _______ is the hop count. is an intradomain routing
A) weed destination. A) OSPF based on _________
B) graft A) unicast B) RIP routing.
C) prune B) multicast C) BGP A) distance vector
D) none of the above C) broadcast D) none of the above B) link state
14. RPB guarantees that D) none of the above 22. A static table is one C) path vector
each destination receives 18. The _______ protocol _______. D) none of the above
_________ of the packet. allows the administrator to A) with manual entries 26. ____________ is a
A) one copy assign a cost, called the B) which is updated group of networks and
B) no copies metric, to each route. automatically routers under the authority
C) multiple copies A) OSPF C) either a or b of a single administration.
D) none of the above B) RIP D) none of the above A) An autonomous system
15. Emulation of ________ C) BGP 23. The idea of address B) An area
through ___________ is D) none of the above aggregation was designed C) both a and b
not efficient and may 19. A one-to-all to alleviate the increase in D) none of the above
create long delays. communication between routing table entries when View Answer:
A) unicasting; multiple one source and all hosts on using ________. 27. In the group-shared
unicasting a network is classified as a A) classful addressing tree approach, _________
B) multicasting; multiple _______ communication. B) classless addressing involved in multicasting.
unicasting A) unicast C) both a and b A) only the core router is
B) all routers are C) stub 34. _______ deals with the A) forwarding
C) only some routers are D) none of the above issues of creating and B) backwarding
D) none of the above 31. The Open Shortest Path maintaining routing tables. C) flooding
28. In OSPF, a ________ First (OSPF) protocol is an A) Forwarding D) none of the above
link is a network is intradomain routing B) Routing 38. A _______ routing
connected to only one protocol based on _______ C) Directing table is updated
router. routing. D) none of the above periodically using one of
A) point-to-point A) distance vector 35. To create a the dynamic routing
B) transient B) link state neighborhood relationship, protocols.
C) stub C) path vector a router running BGP sends A) static
D) none of the above D) none of the above an ________ message. B) dynamic
29. _______ adds pruning 32. In unicast routing, each A) open C) hierarchical
and grafting to _______ to router in the domain has a B) update D) none of the above
create a multicast shortest table that defines a ______ C) keep alive 39. A one-to-many
path tree that supports path tree to possible D) none of the above communication between
dynamic membership destinations. 36. The Multicast Open one source and a specific
changes. A) average Shortest Path First group of hosts is classified
A) RPM; RPB B) longest (MOSPF) protocol is an as a _______
B) RPB; RPM C) shortest extension of the OSPF communication.
C) RPF: RPM D) none of the above protocol that uses A) unicast
D) none of the above 33. In _______, a logical multicast routing to create B) multicast
30. In OSPF, when the link tunnel is established by source-based trees. The C) broadcast
between two routers is encapsulating the multicast protocol is based on D) none of the above
broken, the administration packet inside a unicast _______ routing. 40. A one-to-one
may create a _________ packet. A) distance vector communication between
link between them using a A) UNIBONE B) link state one source and one
longer path that probably B) MULTBONE C) path vector destination is classified as a
goes through several C) MBONE D) none of the above _______ communication.
routers. D) none of the above 37. RPF eliminates the A) unicast
A) point-to-point View Answer: ________ in the flooding B) multicast
B) transient process. C) broadcast
D) none of the above B) intradomain routing 48. In OSPF, a ________ C) RPM
41. A _______ routing C) both a and b link connects two routers D) none of the above
table contains information D) none of the above without any other host or 52. The task of moving the
entered manually. 45. In RPF, a router router in between. packet from the input
A) static forwards only the copy that A) point-to-point queue to the output queue
B) dynamic has traveled the _______ B) transient in a router is done by
C) hierarchical path from the source to C) stub _________.
D) none of the above the router. D) none of the above A) input and output ports
42. PIM-DM is used in a A) shortest 49. In _______ forwarding, B) routing processor
_______ multicast B) longest the routing table holds the C) switching fabrics
environment, such as a C) average address of just the next D) none of the above
LAN. D) none of the above hop instead of complete 53. In _______ delivery,
A) dense 46. In ________ routing, route information. both the deliverer of the IP
B) sparse we assume that there is A) next-hop packet and the destination
C) a or b one node (or more) in each B) network-specific are on the same network.
D) none of the above autonomous system that C) host-specific A) a connectionless
43. In distance vector acts on behalf of the entire D) default B) a direct
routing, each node autonomous system. 50. In _______ forwarding, C) an indirect
periodically shares its A) distant vector the destination address is a D) none of the above
routing table with B) path vector network address in the 54. In _______ forwarding,
_________ and whenever C) link state routing table. the mask and destination
there is a change. D) none of the above A) next-hop addresses are both 0.0.0.0
A) every other node 47. ___________ is an B) network-specific in the routing table.
B) its immediate neighbors interdomain routing C) host-specific A) next-hop
C) one neighbor protocol using path vector D) default B) network-specific
D) none of the above routing. View Answer: C) host-specific
44. Routing inside an A) BGP 51. Pruning and grafting D) default
autonomous system is B) RIP are strategies used in 55. In the _______ tree
referred to as C) OSPF _______. approach, each router
_______________. D) none of the above A) RPF needs to have one shortest
A) interdomain routing B) RPB path tree for each group.
A) group-shared B) which is updated D) none of the above group through a specific
B) source-based automatically View Answer: router.
C) a or b C) either a or b 64. The principle of A) weed
D) none of the above D) none of the above ________ states that the B) graft
56. The use of hierarchy in 60. In ______, the router routing table is sorted from C) prune
routing tables can forwards the received the longest mask to the D) none of the above
________ the size of the packet through only one of shortest mask.
routing tables. its interfaces. A) first mask matching
A) reduce A) unicasting B) shortest mask matching Forouzan: MCQ in Remote
B) increase B) multicasting C) longest mask matching Logging, Electronic Mail,
C) both a and b C) broadcasting D) none of the above and File Transfer
D) none of the above D) none of the above 65. PIM-SM is used in a 1. When both sender and
57. In _______ routing, the 61. In OSPF, a _______ link _______multicast receiver are connected to a
least cost route between is a network with several environment such as a mail server via a LAN or a
any two nodes is the route routers attached to it. WAN. WAN, we need
with the minimum A) point-to-point A) dense ___________________.
distance. B) transient B) sparse A) two UAs, two pairs of
A) path vector C) stub C) a or b MTAs, and a pair of MAAs
B) distance vector D) none of the above D) none of the above B) two UAs, and two pairs
C) link state 62. The _________ routing 66. The routing processor of MTAs
D) none of the above uses the Dijkstra algorithm of a router performs the C) two UAs, two pairs of
58. Multicast link state to build a routing table. ________ layer functions MTAs, and two pairs of
routing uses the _______ A) distance vector of the router. MAAs
tree approach. B) link state A) physical and data link D) none of the above
A) source-based C) path vector B) network 2. The actual mail transfer
B) group-shared D) none of the above C) transport is done through
C) a or b 63. An area is _______. D) none of the above ____________.
D) none of the above A) part of an AS 67. A _______ message A) UAs
59. A dynamic table is one B) composed of at least tells an upstream router to B) MTAs
_______. two ASs stop sending multicast C) MAAs
A) with manual entries C) another term for an AS messages for a specific D) none of the above
3. If the sender wants an A) sending; receiving B) character C) retrieve a list
option enabled by the B) request; reply C) line D) none of the above
receiver, it sends a C) data; control D) none of the above 15. During an FTP session
_______ command. D) none of the above 11. The _______ is the data connection is
A) WILL 7. In FTP, ASCII, EBCDIC, software residing on the opened _______.
B) DO and image define an remote system that allows A) exactly once
C) WONT attribute called _______. the remote system to B) exactly twice
D) none of the above A) file type receive characters from a C) as many times as
4. When the sender is B) data structure TELNET server. necessary
connected to the mail C) transmission mode A) terminal driver D) none of the above
server via a LAN or a WAN, D) none of the above B) pseudoterminal driver 16. In FTP, _______ is the
we need ______________. 8. The third stage in an C) TELNET client service type used by the IP
A) two MTA email transfer needs a D) none of the above protocol because this is an
B) two UAs and two pairs ________ protocol. 12. FTP uses the services of interactive connection
of MTAs A) pull ________. between a user (human)
C) two UAs and a pair of B) push A) UDP and a server.
MTAs C) both a and b B) IP A) maximize throughput
D) none of the above D) none of the above C) TCP B) minimize delay
5. The ________ usually 9. _______ is the standard D) none of the above C) minimize error
contains the sender mechanism provided by 13. For the control D) none of the above
address, the receiver TCP/IP for copying a file connection, FTP uses the 17. When a user wants to
address, and other from one host to another. __________ character set. access an application
information. A) TELNET A) regular ASCII program or utility located
A) message B) SMTP B) EBCDIC on a remote machine, he
B) envelope C) TFTP C) NVT ASCII or she performs
C) both a and b D) none of the above D) none of the above ___________ login.
D) none of the above 10. In the _______ mode, 14. In FTP, when we A) local
6. NVT uses two sets of each character typed is _______, it is copied from B) remote
characters, one for sent by the client to the the client to the server. C) temporary
_____and one for server. A) retrieve a file D) none of the above
__________. A) default B) store a file
18. The third stage in an A) SMTP C) a and b C) An agent
email transfer uses a(n) B) SNMP D) none of the above D) none of the above
________ protocol. C) TELNET 26. TELNET is an 30. ________ provides
A) UA D) none of the above abbreviation for service to the user to make
B) MTA 22. _________ is a ____________. the process of sending and
C) MAA supplementary protocol A) terminal network receiving a message easier.
D) none of the above that allows non-ASCII data B) telephone network A) An MTA
19. TELNET uses only one to be sent through email. C) telecommunication B) An MAA
TCP connection. The server A) JPEG network C) A UA
uses ________ port and B) MPEG D) none of the above D) none of the above
the client uses ________ C) MIME 27. When a user logs into a 31. The message contains
port. D) none of the above local time-sharing system, the ________ and the
A) a well-known; another 23. Which of the following it is called ________ login. __________.
well-known services is not provided by A) local A) header; envelop
B) an ephemeral; another a UA? B) remote B) header; body
ephemeral A) composing messages C) temporary C) envelop; body
C) a well-known; an B) reading messages D) none of the above D) none of the above
ephemeral C) replying messages 28. Which part of the mail 32. In the ____ mode, line
D) none of the above D) all are created by the UA contains editing (echoing, character
20. For control, NVT uses 24. If the sender wants to the sender and receiver erasing, line erasing, and so
US ASCII characters with enable an option, it sends a names? on) is done by the client.
the highest order bit set to _______ command. A) envelope A) default
______. A) WILL B) address B) character
A) 1 B) DO C) header C) line
B) 0 C) WONT D) none of the above D) none of the above
C) a or b D) none of the above 29. ________ is part of a 33. The MIME _______
D) none of the above 25. In FTP, when we local hard drive, a special header uses text to
21. The formal protocol _______, it is copied from file with permission describe the type of data in
that defines the MTA client the server to the client. restrictions. the body of the message.
and server in the Internet is A) retrieve a file A) A message A) content-type
called ___________. B) retrieve a list B) A response
B) content-transfer- D) none of the above special control character 45. The _______ translates
encoding 38. The _______ translates called ________. local characters into NVT
C) content-description NVT characters into a form A) ICA form.
D) none of the above acceptable by the remote B) IAC A) terminal driver
34. If the sender wants to operating system. C) AIC B) TELNET client
disable an option, it sends A) terminal driver D) none of the above C) TELNET server
a _______ command. B) TELNET client 42. When the sender and D) none of the above
A) WILL C) TELNET server the receiver of an email are 46. Currently two message
B) DO D) none of the above on different systems, we access protocols are
C) WONT 39. When the sender and need only _____________. available: _______ and
D) none of the above the receiver of an email are A) one MTA _________.
35. SMTP is a on the same system, we B) two UAs A) POP3; IMAP2
__________protocol. need only ___________. C) two UAs and one pair of B) POP4; IMAP1
A) pull A) one UA MTAs C) POP3; IMAP4
B) push B) two UAs D) none of the above D) none of the above
C) both a and b C) one UA and one MTA 43. During an FTP session 47. TELNET is a ________
D) none of the above D) none of the above the control connection is client-server application
36. In FTP, there are three 40. In the Internet, the opened _______. program.
types of _______: stream, email address consists of A) exactly once A) specific-purpose
block, and compressed. two parts: a _______ and a B) exactly twice B) general-purpose
A) file types _______. C) as many times as C) both a and b
B) data structures A) local part; domain name necessary D) none of the above
C) transmission modes B) global part; domain D) none of the above 48. In FTP, a file can be
D) none of the above name 44. If the sender wants an organized into records,
37. For data, NVT uses US C) label; domain name option disabled by the pages, or a stream of bytes.
ASCII characters with the D) none of the above receiver, it sends a These are types of an
highest order bit set to 41. To distinguish data _______ command. attribute called _______.
______. from control characters, A) WILL A) file types
A) 1 each sequence of control B) DO B) data structures
B) 0 characters is preceded by a C) DONT C) transmission modes
C) a or b D) none of the above D) none of the above
49. The process of C) command-based and A) ciphertext 7. A ________ cipher
transferring a mail message data-based B) plaintext replaces one character
occurs in ________ phases. D) none of the above C) secret-text with another character.
A) two 53. _______ is more D) none of the above A) substitution
B) four powerful and complex than 4. A(n) _______ algorithm B) transposition
C) five _______. transforms plaintext to C) either (a) or (b)
D) none of the above A) POP3; IMAP4 ciphertext. D) neither (a) nor (b)
50. In FTP, the well-known B) IMAP4; POP3 A) encryption 8. The ________ cipher
port ____ is used for the C) SMTP; POP3 B) decryption reorders the plaintext
control connection and the D) none of the above C) either (a) or (b) characters to create a
well-known port ________ D) neither (a) nor (b) ciphertext.
for the data connection. Forouzan: MCQ in 5. The ________ method A) substitution
A) 21; 22 Cryptography provides a one-time B) transposition
B) 21; 20 1. One commonly used session key for two parties. C) either (a) or (b)
C) 20; 21 public-key cryptography A) Diffie-Hellman D) neither (a) nor (b)
D) none of the above method is the ______ B) RSA 9. _______ is a round
51. In the _______ mode, algorithm. C) DES cipher based on the
the echoing is done by the A) RSS D) AES Rijndael algorithm that
client. B) RAS 6. A(n) ______ is a keyless uses a 128-bit block of
A) default C) RSA substitution cipher with N data.
B) character D) RAA inputs and M outputs that A) AEE
C) line 2. A(n) ______ algorithm uses a formula to define B) AED
D) none of the above transforms ciphertext to the relationship between C) AER
52. There are two types of plaintext. the input stream and the D) AES
user agents: _________ A) encryption output stream. 10. The ________is the
and ___________. B) decryption A) S-box original message before
A) command-driven; data- C) either (a) or (b) B) P-box transformation.
driven D) neither (a) nor (b) C) T-box A) ciphertext
B) command-driven; GUI- 3. The ________ is the D) none of the above B) plaintext
based message after C) secret-text
transformation. D) none of the above
11. A modern cipher is B) public 19. ECB and CBC are C) either (a) or (b)
usually a complex C) either a or b ________ ciphers. D) neither (a) nor (b)
_____cipher made of a D) neither (a) nor (b) A) block 23. DES has an initial and
combination of different 15. AES has _____ different B) stream final permutation block
simple ciphers. configurations. C) field and _________ rounds.
A) round A) two D) none of the above A) 14
B) circle B) three 20. A(n) _______is a B) 15
C) square C) four keyless transposition C) 16
D) none of the above D) five cipher with N inputs and M D) none of the above
12. The _________ attack 16. DES is a(n) ________ outputs that uses a table to
can endanger the security method adopted by the define the relationship 24. The DES function has
of the Diffie-Hellman U.S. government. between the input stream _______ components.
method if two parties are A) symmetric-key and the output stream. A) 2
not authenticated to each B) asymmetric-key A) S-box B) 3
other. C) either (a) or (b) B) P-box C) 4
A) man-in-the-middle D) neither (a) nor (b) C) T-box D) 5
B) ciphertext attack 17. DES uses a key D) none of the above 25. In a(n) ________
C) plaintext attack generator to generate 21. ________ DES was cipher, the same key is
D) none of the above sixteen _______ round designed to increase the used by both the sender
13. A combination of an keys. size of the DES key. and receiver.
encryption algorithm and a A) 32-bit A) Double A) symmetric-key
decryption algorithm is B) 48-bit B) Triple B) asymmetric-key
called a ________. C) 54-bit C) Quadruple C) either (a) or (b)
A) cipher D) 42-bit D) none of the above D) neither (a) nor (b)
B) secret 18. The Caesar cipher is a 22. ________ is the science 26. _________ ciphers can
C) key _______cipher that has a and art of transforming be categorized into two
D) none of the above key of 3. messages to make them broad categories:
14. In an asymmetric-key A) transposition secure and immune to monoalphabetic and
cipher, the receiver uses B) additive attacks. polyalphabetic.
the ______ key. C) shift A) Cryptography A) Substitution
A) private D) none of the above B) Cryptoanalysis B) Transposition
C) either (a) or (b) C) key B) decryption 7. A witness used in entity
D) neither (a) nor (b) D) none of the above C) hash authentication is
27. The _______ cipher is 31. In a(n) ________, the D) none of the above ____________.
the simplest key is called the secret key. 4. The secret key between A) something known
monoalphabetic cipher. It A) symmetric-key members needs to be B) something possessed
uses modular arithmetic B) asymmetric-key created as a ______ key C) something inherent
with a modulus of 26. C) either (a) or (b) when two members D) all of the above
A) transposition D) neither (a) nor (b) contact KDC. 8. A _______ message
B) additive Forouzan: MCQ in A) public digest is used as an MDC.
C) shift Network Security B) session A) keyless
D) none of the above 1. Message_____ means C) complimentary B) keyed
28. In an asymmetric-key that the data must arrive at D) none of the above C) either (a) or (b)
cipher, the sender uses the receiver exactly as 5. The ________ criterion D) neither (a) nor (b)
the__________ key. sent. ensures that a message 9. A(n)______ creates a
A) private A) confidentiality cannot easily be forged. secret key only between a
B) public B) integrity A) one-wayness member and the center.
C) either (a) or (b) C) authentication B) weak-collision- A) CA
D) neither (a) nor (b) D) none of the above resistance B) KDC
29. In a(n) ________ 2. Message _______ means C) strong-collision- C) KDD
cipher, a pair of keys is that the receiver is ensured resistance D) none of the above
used. that the message is coming D) none of the above 10. ________ means to
A) symmetric-key from the intended sender, 6. A(n) _____ is a trusted prove the identity of the
B) asymmetric-key not an imposter. third party that assigns a entity that tries to access
C) either (a) or (b) A) confidentiality symmetric key to two the system’s resources.
D) neither (a) nor (b) B) integrity parties. A) Message authentication
30. The _______ is a C) authentication A) KDC B) Entity authentication
number or a set of D) none of the above B) CA C) Message confidentiality
numbers on which the 3. A(n) ________function C) KDD D) none of the above
cipher operates. creates a message digest D) none of the above View Answer:
A) cipher out of a message. 11. A ________ signature is
B) secret A) encryption included in the document;
a _______ signature is a B) MAC A) symmetric-key verifier by using one of the
separate entity. C) either (a) or (b) B) asymmetric-key three kinds of witnesses.
A) conventional; digital D) neither (a) nor (b) C) either (a) or (b) A) message authentication
B) digital; digital 16. A(n) _________ can be D) neither (a) nor (b) B) entity authentication
C) either (a) or (b) used to preserve the 20. A(n) ________is a C) message confidentiality
D) neither (a) nor (b) integrity of a document or federal or state D) message integrity
a message. organization that binds a 24. The _______ criterion
12. If _________ is needed, A) message digest public key to an entity and states that it must be
a cryptosystem must be B) message summary issues a certificate. extremely difficult or
applied over the scheme. C) encrypted message A) KDC impossible to create the
A) integrity D) none of the above B) Kerberos message if the message
B) confidentiality 17. Challenge-response C) CA digest is given.
C) nonrepudiation authentication can be done D) none of the above A) one-wayness
D) authentication using ________. 21. Message ________ B) weak-collision-
13. Digital signature A) symmetric-key ciphers means that the sender and resistance
provides ________. B) asymmetric-key ciphers the receiver expect privacy. C) strong-collision-
A) authentication C) keyed-hash functions A) confidentiality resistance
B) nonrepudiation D) all of the above B) integrity D) none of the above
C) both (a) and (b) 18. The _______criterion C) authentication 25. A(n) ______ is a
D) neither (a) nor (b) ensures that we cannot D) none of the above hierarchical system that
14. Digital signature cannot find two messages that 22. In ________ answers queries about key
provide ________ for the hash to the same digest. authentication, the certification.
message. A) one-wayness claimant proves that she A) KDC
A) integrity B) weak-collision- knows a secret without B) PKI
B) confidentiality resistance actually sending it. C) CA
C) nonrepudiation C) strong-collision- A) password-based D) none of the above
D) authentication resistance B) challenge-response 26. _________ means that
15. To authenticate the D) none of the above C) either (a) or (b) a sender must not be able
data origin, one needs a(n) 19. A digital signature D) neither (a) nor (b) to deny sending a message
_______. needs a(n)_________ 23. In _______, a claimant that he sent.
A) MDC system. proves her identity to the A) Confidentiality
B) Integrity 1. _________ operates in from any application layer 9. ______ is the protocol
C) Authentication the transport mode or the protocol, but the protocol designed to create security
D) Nonrepudiation tunnel mode. is normally HTTP. associations, both inbound
27. A hash function must A) IPSec A) SSL and outbound.
meet ________ criteria. B) SSL B) TLS A) SA
A) two C) PGP C) either (a) or (b) B) CA
B) three D) none of the above D) both (a) and (b) C) KDC
C) four 6. IKE is a complex protocol D) IKE
D) none of the above 2. IKE creates SAs for based on ______ other 10. A _______network is
28. __________ is a _____. protocols. used inside an
popular session key creator A) SSL A) two organization.
protocol that requires an B) PGP B) three A) private
authentication server and a C) IPSec C) four B) public
ticket-granting server. D) VP D) five C) semi-private
A) KDC 3. ______ provides either 7. IPSec defines two D) semi-public
B) Kerberos authentication or protocols: _______ and 11. SSL provides
C) CA encryption, or both, for ________. _________.
D) none of the above packets at the IP level. A) AH; SSL A) message integrity
29. Password-based A) AH B) PGP; ESP B) confidentiality
authentication can be B) ESP C) AH; ESP C) compression
divided into two broad C) PGP D) all of the above D) all of the above
categories: _______ and D) SSL 8. In the ______ mode, 12. The Internet authorities
_______. 4. One security protocol for IPSec protects information have reserved addresses
A) fixed; variable the e-mail system is delivered from the for _______.
B) time-stamped; fixed _________. transport layer to the A) intranets
C) fixed; one-time A) IPSec network layer. B) internets
D) none of the above B) SSL A) transport C) extranets
Forouzan: MCQ in Security C) PGP B) tunnel D) none of the above
in the Internet: IPSec, D) none of the above C) either (a) or (b) 13. An _________ is a
SSL/TLS, PGP, VPN, and 5. Typically, ______ can D) neither (a) nor (b) network that allows
Firewalls receive application data
authorized access from A) intranet A) VPP D) none of the above
outside users. B) internet B) VNP 26. ______ provides
A) intranet C) extranet C) VNN authentication at the IP
B) internet D) none of the above D) VPN level.
C) extranet 18. ______ is actually an 22. _______ uses the idea A) AH
D) none of the above IETF version of _____. of certificate trust levels. B) ESP
14. _________ is a A) TLS; TSS A) X509 C) PGP
collection of protocols B) SSL; TLS B) PGP D) SSL
designed by the IETF C) TLS; SSL C) KDC 27. In _______, the
(Internet Engineering Task D) SSL; SLT D) none of the above cryptographic algorithms
Force) to provide security 19. In ______, there is a 23. IPSec in the ______ and secrets are sent with
for a packet at the network single path from the fully mode does not protect the the message.
level. trusted authority to any IP header. A) IPSec
A) IPSec certificate. A) transport B) SSL
B) SSL A) X509 B) tunnel C) TLS
C) PGP B) PGP C) either (a) or (b) D) PGP
D) none of the above C) KDC D) neither (a) nor (b) 28. ______ is designed to
15. IKE uses _______. D) none of the above 24. ________ provides provide security and
A) Oakley 20. The combination of key privacy, integrity, and compression services to
B) SKEME exchange, hash, and authentication in e-mail. data generated from the
C) ISAKMP encryption algorithms A) IPSec application layer.
D) all of the above defines a ________ for B) SSL A) SSL
16. IPSec uses a set of SAs each SSL session. C) PGP B) TLS
called the ________. A) list of protocols D) none of the above C) either (a) or (b)
A) SAD B) cipher suite 25. In _____, there can be D) both (a) and (b)
B) SAB C) list of keys multiple paths from fully or 29. _______ provide
C) SADB D) none of the above partially trusted security at the transport
D) none of the above 21. A ______ provides authorities. layer.
17. An ________ is a privacy for LANs that must A) X509 A) SSL
private network that uses communicate through the B) PGP B) TLS
the Internet model. global Internet. C) KDC C) either (a) or (b)
D) both (a) and (b) 34. In PGP, to exchange e-
30. The _______ mode is mail messages, a user
normally used when we needs a ring of _______
need host-to-host (end-to- keys.
end) protection of data. A) secret
A) transport B) public
B) tunnel C) either (a) or (b)
C) either (a) or (b) D) both (a) and (b)
D) neither (a) nor (b)
31. In the _______ mode,
IPSec protects the whole IP GOODLUCK SA EXAM
packet, including the BABY! GALINGAN MO AH!
original IP header. PANCIT BIHON IS ON THE
A) transport LINE!
B) tunnel I LOVE YOU BABY!
C) either (a) or (b)
D) neither (a) nor (b)
32. ______ was invented
by Phil Zimmerman.
A) IPSec
B) SSL
C) PGP
D) none of the above
33. A _______ layer
security protocol provides
end-to-end security
services for applications.
A) data link
B) network
C) transport
D) none of the above

You might also like