Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 28

Forouzan: MCQ in B) multipoint D) Transmission B) half-duplex

Introduction to Data C) point-to-point 9. ________ defines how a C) full-duplex


Communications D) secondary particular pattern to be D) all of the above
and Networking 5. Which topology requires interpreted, and what 13. _______ are special-
1. There are a multipoint connection? action is to be taken based interest groups that quickly
______________ Internet A) Bus on that interpretation. test, evaluate, and
service providers. B) Star A) Syntax standardize new
A) regional C) Mesh B) Semantics technologies.
B) local D) Ring C) Timing A) Standards organizations
C) national and 6. A ________ is a set of D) None of the above B) Regulatory agencies
international rules that governs data C) Forums
D) all of the above communication. 10. Frequency of failure D) All of the above
2. ______ refers to the A) protocol and network recovery time 14. Which agency
physical or logical B) forum after a failure are measures developed standards for
arrangement of a network. C)standard of the _______of a physical connection
A) Topology D) none of the above network. interfaces and electronic
B) Mode of operation 7. In a ______ connection, A) Performance signaling specifications?
C) Data flow two and only two devices B) Security A) ISO
D) None of the above are connected by a C) Reliability B) ITU-T
3. A ______ is a data dedicated link. D) Feasibility C) ANSI
communication system A) multipoint 11. A television broadcast D) EIA
spanning states, countries, B) point-to-point is an example of _______ 15. A _______ is a data
or the whole world. C) (a) and (b) transmission. communication system
A) MAN D) none of the above A) half-duplex within a building, plant,
B) WAN 8. The information to be B) simplex or campus, or between
C) LAN communicated in a data C) full-duplex nearby buildings.
D) none of the above communications system is D) automatic A) LAN
4. A _______ connection the _______. 12. Data flow between two B) MAN
provides a dedicated link A) Medium devices can occur in a C) WAN
between two devices. B) Protocol _______ way. D) none of the above
A) primary C) Message A) simplex
16. _______ refers to two A) A WAN ______________ data, meaning the order in
characteristics: when data B) An internet transmission. which they are presented.
should be sent and how C) A LAN A) simplex A) Semantics
fast it can be sent. D) None of the above B) half-duplex B) Syntax
A) Semantics 21. In a ________ C) full-duplex C) Timing
B) Timing connection, three or more D) automatic D) All of the above
C) Syntax devices share a link. 25. Which topology 29. An unauthorized user is
D) none of the above A) point-to-point requires a central a network _______ issue.
17. This was the first B) multipoint controller or hub? A) Security
network. C) (a) and (b) A) Mesh B) Reliability
A) CSNET D) none of the above B) Bus C) Performance
B) NSFNET 22. Which organization has C) Star D) All the above
C) ARPANET authority over interstate D) Ring 30. ________ is an idea or
D) ANSNET and international 26. The _______ is the concept that is a precursor
18. Devices may be commerce in the physical path over which a to an Internet standard.
arranged in a _____ communications field? message travels. A) RCF
topology. A) FCC A) Protocol B) ID
A) mesh B) IEEE B) Signal C) RFC
B) ring C) ITU-T C) Medium D) none of the above
C) bus D) ISOC D) All the above 31. In _______
D) all of the above 23. In the original 27. In a _______ transmission, the channel
19. _______ is the protocol ARPANET, _______ were connection, more than two capacity is shared by both
suite for the current directly connected devices can share a single communicating devices at
Internet. together. link. all times.
A) UNIX A) routers A) multipoint A) simplex
B) NCP B) host computers B) point-to-point B) half-duplex
C) TCP/IP C) networks C) primary C) full-duplex
D) ACM D) IMPs D) secondary D) half-simplex
20. ________ is a collection 24. Communication 28. _______ refers to the
of many separate between a computer and a structure or format of the Forouzan: MCQ in
networks. keyboard involves Network Models Set 1
1. The ______ layer adds C) ARP A) user C) both a and b
a header to the packet D) none of the above B) network D) none of the above
coming from the upper 5. The process-to-process C) both (a) and (b) 13. The _______ layer links
layer that includes the delivery of the entire D) neither (a) nor (b) the network support layers
logical addresses of the message is the 9. The physical, data link, and the user support
sender and receiver. responsibility of the and network layers are the layers.
A) data link _______ layer. ______ support layers. A) session
B) network A) Transport A) network B) transport
C) physical B) Application B) user C) data link
D) none of the above C) Physical C) both (a) and (b) D) network
2. Which of the following is D) Network D) neither (a) nor (b) 14. ICMPv6 includes
an application layer 6. The ______ layer is 10. The ________ layer is _______.
service? responsible for moving responsible for the A) IGMP
A) File transfer and access frames from one hop process-to-process delivery B) ARP
B) Mail service (node) to the next. of the entire message. C) RARP
C) Remote log-in A) transport A) transport D) a and b
D) All the above B) data link B) physical 15. The ____ address
3. When data are C) physical C) network uniquely defines a host
transmitted from device A D) none of the above D) data link on the Internet.
to device B, the header 7. The _______ layer is 11. The _______ layer lies A) IP
from A’s layer 4 is read by responsible for delivering between the network layer B) port
B’s _______ layer. data units from one station and the application layer. C)specific
A) Transport to the next without errors. A) Data link D) physical
B) Application A) physical B) Transport 16. The _______ layer
C) Physical B) data link C) Physical coordinates the functions
D) None of the above C) transport D) None of the above required to transmit a bit
4. __________ provides D) network 12. The Internetworking stream over a physical
full transport layer services 8. The session, Protocol (IP) is a ________ medium.
to applications. presentation, and protocol. A) data link
A) UDP application layers are the A) connection-oriented B) transport
B) TCP ____ support layers. B) reliable C) network
D) physical C) Data link Forouzan: MCQ in movement of _______
17. The ______ layer is D) None of the above Network Models Set 2 over the physical medium.
responsible for the source- 21. IPv6 has _______ 25. The TCP/IP _______ A) dialogs
to-destination delivery of a -bit addresses. layer is equivalent to the B) protocols
packet across multiple A) 128 combined session, C) bits
network links. B) 32 presentation, and D) programs
A) network C) 64 application layers of the 29. To deliver a message to
B) physical D) variable OSI model. the correct application
C) data link 22. The_____ address A) data link program running on a host,
D) transport identifies a process on a B) network the _______ address must
18. Mail services are host. C) physical be consulted.
available to network users A) specific D) application A) physical
through the _______ layer. B) port 26. When a host on B) port
A) Transport C) IP network A sends a message C) IP
B) Physical D) physical to a host on network B, D) none of the above
C) Data link 23. The_________ layer is which address does the 30. Ethernet uses a ______
D) Application responsible for the delivery router look at? physical address that is
19. The ____ created a of a message from one A) logical imprinted on the network
model called the Open process to another. B) physical interface card (NIC).
Systems Interconnection, A) transport C) port A) 32-bit
which allows diverse B) network D) none of the above B) 6-byte
systems to communicate. C) physical 27. As the data packet C) 64-bit
A) IEEE D) none of the above moves from the upper to D) none of the above
B) ISO 24. The _________ layer the lower layers, headers 31. The _______ layer is
C) OSI enables the users to access are _______. the layer closest to the
D) none of the above the network. A) Rearranged transmission medium.
20. The _______ layer A) application B) Removed A) Network
changes bits into B) physical C) Added B) Transport
electromagnetic signals. C) data link D) Modified C) Physical
A) Physical D) transport 28. The physical layer is D) Data link
B) Transport concerned with the
32. The OSI model consists C) Manufacturers disliked 39. The Internet model interactions between
of _______ layers. the TCP/IP protocol suite. consists of _______ layers. communicating devices.
A) eight D) None of the above A) Eight A) session
B) seven 36. In the OSI model, as a B) Seven B) physical
C) five data packet moves from C) Five C) transport
D) three the lower to the upper D) Three D) network
33. The ________ address, layers, headers are 40. In the OSI model, 43. A port address in
also known as the link _______. what is the main function TCP/IP is ______ bits long.
address, is the address of a A) removed of the transport layer? A) 16
node as defined by its LAN B) added A) process-to-process B) 32
or WAN. C) rearranged message delivery C) 48
A) IP D) modified B) node-to-node delivery D) none of the above
B) port 37. In the OSI model, when C) synchronization 44. In the OSI model,
C) specific data is transmitted from D) updating and encryption and decryption
D) physical device A to device B, the maintenance of routing are functions of the
34. Layer 2 lies between header from A’s layer 5 is tables ________ layer.
the physical layer and the read by B’s _______ layer. 41. _______ is a process- A) application
_______ layer. A) session to-process protocol that B) presentation
A) Data link B) physical adds only port addresses, C) session
B) Transport C) transport checksum error control, D) transport
C) Network D) presentation and length information to 45. TCP/IP is a ______
D) None of the above 38. The seven-layer _____ the data from the upper hierarchical protocol suite
35. Why was the OSI model model provides guidelines layer. developed ____ the OSI
developed? for the development of A) IP model.
A) The rate of data universally compatible B) TCP A) five-layer; before
transfer was increasing networking protocols. C) UDP B) six-layer; before
exponentially A) ISO D) none of the above C) seven-layer; before
B) Standards were needed B) OSI 42. The ______ layer D) five-layer; after
to allow any two systems C) IEEE establishes, maintains, and 46. The ________ address,
to communicate D) none of the above synchronizes the also known as the link
address, is the address of a
node as defined by its LAN B) two’s complement C) Hamming distance D) Two-dimensional parity
or WAN. arithmetic D) none of the above 6. check
A) logical C) either (a) or (b) The _______ of a 10. In _____ coding, we
B) port D) none of the above 2. polynomial is the highest divide our message into
C) physical The checksum of 1111 power in the polynomial. blocks, each of k bits,
D) none of the above and 1111 is _________. A) range called ___.
47. The _______ model A) 0000 B) power A) block; blockwords
shows how the network B) 1111 C) degree B) block; datawords
functions of a computer C) 1110 D) none of the above C) linear; datawords
ought to be organized. D) 0111 7. In modulo-2 arithmetic, D) none of the above
A) ANSI 3. In modulo-11 __________ give the same 11. A _____ error means
B) CCITT arithmetic, we use only the results. that two or more bits in the
C) ISO integers in the range A) addition data unit have changed.
D) OSI ______, inclusive. and subtraction A) burst
48. The _______ layer A) 1 to 10 B) addition and B) double-bit
ensures interoperability B) 0 to 10 multiplication C) single-bit
between communicating C) 1 to 11 C) addition and division D) none of the above
devices through D) none of the above D) none of the above 8. 12. Adding 1 and 1 in
transformation of data into 4. In cyclic redundancy In cyclic redundancy modulo-2 arithmetic
a mutually agreed upon checking, the divisor is checking, what is the CRC? results in _________.
format. _______ the CRC. A) The quotient A) 0
A) network A) one bit less than B) The dividend B) 1
B) presentation B) one bit more than C) The divisor C) 2
C) transport C) The same size as D) The remainder D) none of the above
D) data link D) none of the above 5. 9. Which error detection 13. In ________ error
Forouzan: MCQ in Error The ________ between method consists of just one correction, the receiver
Detection and Correction two words is the number of redundant bit per data corrects errors without
1. Checksums use differences between unit? requesting retransmission.
_________ arithmetic. corresponding bits. A) CRC A) onward
A) one’s complement A) Hamming rule B) Checksum B) forward
arithmetic B) Hamming code C) Simple parity check C) backward
D) none of the above C) ORing B) 6 D) none of the above
14. If the Hamming D) none of the above C) 5 26. In block coding, if n = 5,
distance between a 18. In ________ error D) none of the above the maximum Hamming
dataword and the correction, the receiver 22. The _____of errors is distance between two
corresponding codeword is asks the sender to send the more difficult than the codewords is ________. A)
three, there are _____ bits data again. ______. 5
in error. A) forward A) detection; correction B) 3
A) 5 B) backward B) correction; detection C) 2
B) 4 C) retransmission C) creation; correction D) none of the above
C) 3 D) none of the above D) creation; detection 27. Which error detection
D) none of the above 19. We can divide coding 23. In block coding, if k = 2 method uses one’s
15. A simple parity- schemes into two broad and n = 3, we have complement arithmetic?
check code can detect categories: ________ and _______ invalid A) Checksum
__________ errors. ______coding. codewords. B) CRC
A) an odd-number of A) linear; nonlinear A) 4 C) Simple parity check
B) an even-number of B) block; convolution B) 8 D) Two-dimensional parity
C) two C) block; linear C) 2 check
D) no errors D) none of the above D) none of the above 28. The divisor in a cyclic
16. The Hamming 20. In modulo-2 arithmetic, 24. The checksum of 0000 code is normally called the
distance between equal we use only ______. and 0000 is __________. _________.
codewords is _________. A) 1 and 2 A) 0000 A) redundancy
A) 0 B) 0 and 1 B) 1111 B) degree
B) 1 C) 0 and 2 C) 0111 C) generator
C) n D) none of the above D) 1110 D) none of the above
D) none of the above 21. To guarantee correction 25. In one’s complement 29. In modulo-2 arithmetic,
17. In a linear block code, of up to 5 errors in all cases, arithmetic, if positive 7 is we use the ______
the _______ of any two the minimum Hamming 0111, then negative 7 is operation for both addition
valid codewords creates distance in a block code ________. and subtraction.
another valid codeword. must be A) 1101 A) OR
A) ANDing ________. B) 1000 B) XOR
B) XORing A) 11 C) 1111 C) AND
D) none of the above a codeword is rotated, the result B) 7 6. HDLC is an acronym for
30. We add r redundant is another codeword. C) 5 _______.
bits to each block to make A) Convolution D) any of the above A) Half-duplex digital link
the length n = k + r. The B) Cyclic 3. The Stop-And-Wait combination
resulting n-bit blocks are C) Non-linear ARQ, Go-Back-N ARQ, and B) Host double-level
called _________. D) none of the above the Selective Repeat ARQ circuit
A) codewords 34. The Hamming distance are for ______ channels. C) High-duplex line
B) datawords between 100 and 001 is A) noiseless communication
C) blockwords ________. A) B) noisy D) High-level data link
D) none of the above 0 C) either (a) or (b) D) control
31. To guarantee the B) 1 C) 2 neither (a) nor (b) 7. In Selective Repeat ARQ,
detection of up to 5 errors D) none of the above 4. The _________Protocol, if 5 is the number of bits
in all cases, the minimum Forouzan: MCQ in Data adds a simple error control for the sequence number,
Hamming distance in a Link Control mechanism to the then the maximum size of
block code must be 1. In Go-Back-N ARQ, if 5 is the _______Protocol. the receive window must
_______. number of bits for the A) Selective Repeat ARQ; be _____.
A) 11 sequence number, then the Go-Back-N ARQ A) 1
B) 5 maximum size of the receive B) Go-Back-N ARQ; Stop- B) 15
C) 6 window must be and-Wait C) 16
D) none of the above _______. A) C) Stop-and-Wait ARQ; D) 31
32. A generator that 1 B) 15 C) 16 Stop-and-Wait 8. In Go-Back-N ARQ, if 5
contains a factor of ____ D) 31 D) none of the above is the number of bits for
can detect all odd- 5. In PPP, the ________ is the sequence number,
numbered errors. 2. In Go-Back-N ARQ, if frames responsible for then the maximum size of
A) x 4, 5, and 6 are received establishing, maintaining, the send window must be
B) 1 successfully, the receiver may configuring, and _____.
C) x + 1 send an ACK terminating links. A) 1 B)
D) none of the above _______ to the sender. A) A) PAP B) 15 C)
33. _______codes are 6 CHAP C) 16 D)
special linear block codes LCP D) 31
with one extra property. If NCP
9. In Stop-and-Wait ARQ, 12. In the Go-Back-N Protocol, 16. In _________, the Protocol (PPP), which is a
the acknowledgment if the size of the sequence configuration is balanced. _________protocol.
number always announces number field is 8, the The link is point-to-point, A) byte-oriented
in ______ arithmetic the sequence numbers are in and each station can B) bit-oriented
sequence number of the ________ arithmetic, A) function as a primary and a C) character-oriented
next frame expected. modulo-256 secondary. D) none of the above
A) modulo-m B) modulo- 8 C) A) ARM 20. For Stop-and-Wait ARQ,
B) modulo-2 modulo-2 B) ABM for 10 data packets sent,
C) modulo-4 D) none of the above C) NBM _______ acknowledgments
D) none of the above 13. ______ control refers to D) NRM are needed.
10. In Selective Repeat methods of error detection 17. Byte stuffing means A) less than 10
ARQ, if 5 is the number of and correction. A) Flow adding a special byte to the B) more than 10
bits for the sequence B) Error data section of the frame C) exactly 10
number, then the C) Transmission when there is a character D) none of the above
maximum size of the send D) none of the above with the same pattern as 21. _________framing uses
window must be _____. 14. In a Go-Back-N ARQ, if the the ______. two categories of
A) 1 window size is 63, what is the A) trailer protocols: character-
B) 15 range of sequence numbers? B) flag C) oriented and bit-oriented.
C) 16 A) 1 to 63 B) 1 header A) Standard
D) 31 to 64 C) 0 to D) none of the above B) Fixed-size C)
11. _______ control refers 63 D) 0 to 64 18. The ______ Protocol Variable-size
to a set of procedures used 15. Both Go-Back-N and has neither flow nor error D) None of the above
to restrict the amount of Selective-Repeat Protocols use control. 22. _______ control refers
data that the sender can a _________. A) Selective-Repeat ARQ to a set of procedures used
send before waiting for A) sliding window B) B) Go-Back-N ARQ to restrict the amount of
acknowledgment. sliding frame C) sliding C) Stop-and-Wait data that the sender can
A) Flow packet D) Simplest send before waiting for
B) Error D) none of the above 19. The most common acknowledgment.
C) Transmission protocol for point-to-point A) Flow
D) none of the above access is the Point-to-Point B) Error
C) Transmission
D) none of the above C) NRM when there is a sequence D) Go-Back-N ARQ
23. In a ________ protocol, D) ABM of bits with the same 34. In Stop-and-Wait ARQ,
the data section of a frame 27. In a _________ pattern as the ________. we use sequence numbers
is a sequence of characters. protocol, the data section of a A) trailer to number the frames. The
A) bit-oriented frame is a sequence of bits. B) flag sequence numbers are
B) character-oriented A) bit-oriented B) C) header based on
C) either (a) or (b) byte-oriented C) D) none of the above __________arithmetic.
D) none of the above either (a) or (b) 31. In the A) modulo-m
24. In _______ framing, D) none of the above _________Protocol, if no B) modulo-2
there is no need for 28. In ________ framing, we acknowledgment for a C) modulo-4
defining the boundaries of need a delimiter (flag) to frame has arrived, we D) none of the above
frames. define the boundary of two resend all outstanding 35. In the _____ Protocol,
A) standard B) frames. frames. the sender sends its frames
fixed-size C) A) standard B) A) Go-Back-N ARQ one after another with no
variable-size fixed-size C) B) Selective-Repeat ARQ regard to the receiver.
D) none of the above variable-size C) Stop-and-Wait ARQ A) Simplest
25. The _______Protocol D) none of the above D) none of the above B) Selective-Repeat ARQ
has both flow control and 29. High-level Data Link 32. The Simplest Protocol C) Stop-and-Wait
error control. Control (HDLC) is a and the Stop-and-Wait D) Go-Back-N ARQ
A) Stop-and-Wait _______ protocol for Protocol are for ______ 36. _________control in
B) Selective-Repeat ARQ communication over point-to- channels. the data link layer is based
C) Go-Back-N ARQ point and multipoint links. A) noiseless on automatic repeat
D) both (b) and (c) A) byte-oriented B) B) noisy request, which is the
26. In _________, the bit-oriented C) either (a) or (b) retransmission of data.
station configuration is C) character-oriented D) D) neither (a) nor (b) A) Flow
unbalanced. We have one none of the above 33. The _______Protocol B) Error
primary station and 30. Bit stuffing means adding has flow control, but not C) Transmission
multiple secondary an extra 0 to the data section error control. D) none of the above
stations. of the frame A) Selective-Repeat ARQ 37. In PPP, _______ is a
A) ARM B) Stop-and-Wait three-way hand-shaking
B) NBM C) Simplest authentication protocol in
which the password is kept C) character-oriented; bit 44. _______ in the data Forouzan: MCQ in
secret; it is never sent stuffing link layer separates a Connecting LANs,
online. D) none of the above message from one source Backbone Networks,
A) PAP 41. In the _____ Protocol, to a destination, or from and Virtual LANs
B) LCP the sender sends one other messages going from 1. VLANs create _________
C) NCP frame, stops until it other sources to other domains.
D) CHAP receives confirmation from destinations. A) multicast
38. In PPP, ________ is a the receiver, and then A) Controlling B) broadcast
simple authentication sends the next frame. B) Framing C) C) unicast
procedure with a two-step A) Simplest Digitizing D) none of the above
process: B) Stop-and-Wait D) none of the above 2. A ________ operates in
A) CHAP C) Selective-Repeat ARQ 45. Data link control deals both the physical and the
B) PAP C) D) Go-Back-N ARQ with the design and data link layer.
LCP D) 42. Stop-and-Wait ARQ is a procedures for ______ A) router B)
NCP special case of Go-Back-N communication. bridge C)
39. In the _________ ARQ in which the size of A) node-to-node repeater D)
protocol we avoid the send window is ___. A) B) process-to-process passive hub
unnecessary transmission 1 C) host-to-host 3. A _______ is a device
by sending only frames B) 2 D) none of the above that operates only in the
that are corrupted. C) 8 46. In _________ physical layer.
A) Selective-Repeat ARQ D) none of the above protocols, we use A) bridge
B) Stop-and-Wait ARQ C) 43. ARQ stands for ________. B) router
Go-Back-N ARQ _______. A) bit-oriented; character C) passive hub
D) none of the above A) Acknowledge repeat stuffing D) repeater
40. In ________ protocols, request B) character-oriented; bit 4. A ______ switch is a
we use ________. B) Automatic stuffing faster and more
A) byte-oriented; bit retransmission request C) character-oriented; sophisticated router.
stuffing C) Automatic repeat byte stuffing A) two-layer
B) bit-oriented; bit quantization D) none of the above B) four-layer C)
stuffing D) Automatic repeat three-layer
request D) none of the above
5. _________ is just a D) none of the above D) none of the above C) simple
connector. 9. In a(n) _______ 13. ________ is actually D) none of the above
A) A passive hub configuration, the a multiport repeater. It is 17. A virtual local area
B) An active hub administrator types the normally used to create network (VLAN) is
C) either (a) or (b) port numbers, the IP connections between configured by _________.
D) neither (a) nor (b) addresses, or other stations in a physical star A) hardware
6. A ______ normally characteristics, using the topology. B) physical wiring
connects LANs and WANs VLAN software. A) A passive hub C) software
in the Internet and has a A) automatic B) An active hub D) none of the above
table that is used for B) manual C) either (a) or (b) 18. A ________ is
making decisions about the C) semiautomatic D) neither (a) nor (b) normally a computer that
route. D) none of the above 14. In a _____ backbone, operates in all five layers
A) router 10. A _______ LAN allows the backbone is just one of the Internet model or
B) bridge several LANs to be switch. seven layers of OSI model.
C) repeater connected. A) star A) gateway
D) none of the above A) wired B) bus B) router
7. A repeater is a B) wireless C) ring C) bridge
connecting device that C) backbone D) none of the above D) repeater
operates in the _______ D) none of the above 15. A spanning tree is a 19. A ________ is a
layer of the Internet model. 11. A backbone is usually a graph in which there is no device in which the
A) network ______. _____. stations are completely
B) data link A) star A) arc unaware of its existence.
C) physical B) bus B) loop A) simple bridge
D) all of the above C) either (a) or (b) C) node B) transparent bridge
8. A _______ regenerates a D) neither (a) nor (b) D) branch C) passive hub
signal, connects segments 12. A bridge can use the 16. A ________ bridge can D) repeater
of a LAN, and has no _________ algorithm to forward and filter frames 20. A ______ has a table
filtering capability. create a loopless topology. and automatically build its used in filtering decisions.
A) router A) multiway tree forwarding table. A) bridge
B) repeater B) binary tree A) dual B) passive hub
C) bridge C) spanning tree B) transparent C) repeater
D) none of the above D) repeater defined by the 32. A _____ can be used
21. In a star-topology 25. A _______ is a administrator. as a connecting device
Ethernet LAN, _______ is connecting device that A) automatic between two
just a point where the operates in the physical and B) semiautomatic internetworks that use
signals coming from data link layers of the C) manual different models.
different stations collide; it Internet model. D) none of the above A) gateway
is the collision point. A) router B) 29. IEEE 802.1d B) router C)
A) A passive hub repeater C) specification, defines bridge D)
B) An active hub bridge _________ criteria for a repeater
C) either (a) or (b) D) none of the above transparent bridges. 33. Membership in a VLAN
D) neither (a) nor (b) 26. A _______ can check A) two can be based on
22. VLANs can_________. the MAC addresses B) four _________.
A) provide an extra contained in the frame. A) C) three A) MAC addresses
measure of security repeater D) none of the above B) IP addresses C)
B) reduce network traffic B) bridge C) 30. A two-layer switch is a port numbers D) all
C) either (a) or (b) router ______. of the above
D) both (a) and (b) D) passive hub A) router 34. A ________receives a
23. A ________ link acts as 27. ________ is part of the B) repeater signal and, before it
a LAN in a remote media; its location in the C) bridge becomes too weak or
backbone connected by Internet model is below the D) none of the above corrupted, regenerates the
remote bridges. physical layer. 31. In a bridged LAN, the original bit pattern. It then
A) multidrop A) A passive hub B) An _______ algorithm creates sends the refreshed signal.
B) point-to-point active hub C) either (a) a topology in which each A) router
C) multipoint or (b) D) neither (a) nor LAN can be reached from B) bridge C)
D) none of the above (b) any other LAN through one repeater D)
24. A __________ forwards 28. In a(n) _____ path only. passive hub
every frame; it has no configuration, the stations are A) binary tree 35. In a(n) ______
filtering capability. automatically connected or B) spanning tree configuration, the
A) router disconnected from a VLAN C) unary tree initializing is done
B) bridge using criteria D) none of the above manually, with migrations
C) passive hub done automatically.
A) automatic Forouzan: MCQ in Network C) a or b C) broadcasting
B) semiautomatic Layer: Delivery, Forwarding D) none of the above D) none of the above
C) manual and Routing 5. RPF guarantees that 9. __________ is an
D) none of the above 1. In _______ delivery, the each network receives only implementation of
36. A _______ is a three- deliverer of the IP packet and ____ of the multicast multicast distance vector
layer device that handles the destination are on different packet. routing. It is a source-based
packets based on their networks. A) one copy routing protocol, based on
logical addresses. A) a connection-oriented B) B) two copies RIP.
A) router a direct C) a or b A) MOSPF
B) repeater C) an indirect D) none of the above B) DVMRP
C) bridge D) none of the above 6. Routing between C) CBT
D) none of the above 2. The input and output autonomous systems is D) none of the above
37. A three-layer switch is a ports of a router perform referred to as 10. In multicast routing,
kind of ________. the ________ layer ____________. each involved router needs
A) bridge functions of the router. A) A) interdomain routing to construct a ________
B) router physical and data link B) B) intradomain routing path tree for each group.
C) repeater network C) both a and b A) average
D) none of the above C) transport D) none of the above B) longest
38. Some new two-layer D) none of the above 7. DVMRP is a C) shortest
switches, called _______ 3. _________ broadcasts ________routing protocol, D) none of the above 11. In
switches, have been packets, but creates loops in based on RIP. ________, the multicast
designed to forward the the systems. A) source-based packet must reach only
frame as soon as they A) Forwarding B) B) group-shared those networks that have
check the MAC addresses Flooding C) C) both a and b active members for that
in the header of the frame. Backwarding D) none of the above particular group.
A) come-through D) none of the above 8. In _______, the router A) RPF
B) go-through 4. CBT is a ________ may forward the received B) RPB
C) cut-through protocol that uses a core as packet through several of C) RPM
D) none of the above the root of the tree. its interfaces. D) none of the above
A) source-based B) A) unicasting 12. In ________, each node
group-shared B) multicasting maintains a vector (table)
of minimum distances to C) broadcasting; B) multicast D) none of the above
every node. multicasting C) broadcast 24. In _______ forwarding,
A) path vector D) none of the above D) none of the above 20. the full IP address of a
B) distance vector 16. MOSPF is a _______ For purposes of routing, destination is given in the
C) link state protocol. the Internet is divided routing table.
D) none of the above 13. A A) data-driven into ___________. A) next-hop
_______ message tells an B) command-driven A) wide area networks B) network-specific
upstream router to start C) both a and b B) autonomous networks C) host-specific D)
sending multicast D) none of the above 17. C) autonomous systems default
messages for a specific RPB creates a shortest D) none of the above 25. The Routing
group through a specific path _______ tree from 21. The metric used by Information Protocol (RIP)
router. the source to each _______ is the hop count. is an intradomain routing
A) weed destination. A) OSPF based on _________
B) graft A) unicast B) RIP routing.
C) prune B) multicast C) BGP A) distance vector
D) none of the above C) broadcast D) none of the above B) link state
14. RPB guarantees that D) none of the above 18. 22. A static table is one C) path vector
each destination receives The _______ protocol _______. D) none of the above
_________ of the packet. allows the administrator to A) with manual entries 26. ____________ is a
A) one copy assign a cost, called the B) which is updated group of networks and
B) no copies metric, to each route. automatically routers under the authority
C) multiple copies A) OSPF C) either a or b of a single administration. A)
D) none of the above B) RIP D) none of the above 23. An autonomous system B)
15. Emulation of ________ C) BGP The idea of address An area
through ___________ is D) none of the above 19. A aggregation was designed C) both a and b
not efficient and may one-to-all communication to alleviate the increase in D) none of the above
create long delays. between one source and routing table entries when View Answer:
A) unicasting; multiple all hosts on a network is using ________. 27. In the group-shared
unicasting classified as a A) classful addressing tree approach, _________
B) multicasting; multiple _______ communication. B) classless addressing involved in multicasting.
unicasting A) unicast C) both a and b A) only the core router is
B) all routers are C) stub 34. _______ deals with A) forwarding
C) only some routers are D) none of the above the issues of creating and B) backwarding
D) none of the above 31. The Open Shortest Path maintaining routing tables. C) flooding
28. In OSPF, a ________ First (OSPF) protocol is an A) Forwarding D) none of the above
link is a network is intradomain routing protocol B) Routing 38. A _______ routing
connected to only one based on _______ C) Directing table is updated
router. routing. D) none of the above periodically using one of
A) point-to-point A) distance vector B) 35. To create a the dynamic routing
B) transient link state neighborhood relationship, protocols.
C) stub C) path vector a router running BGP sends A) static
D) none of the above 29. D) none of the above an ________ message. B) dynamic
_______ adds pruning and 32. In unicast routing, each A) open B) C) hierarchical
grafting to _______ to router in the domain has a table update C) D) none of the above 39.
create a multicast shortest that defines a ______ keep alive A one-to-many
path tree that supports path tree to possible D) none of the above communication between
dynamic membership destinations. 36. The Multicast Open one source and a specific
changes. A) average B) Shortest Path First group of hosts is
A) RPM; RPB longest C) (MOSPF) protocol is an classified as a _______
B) RPB; RPM shortest extension of the OSPF communication.
C) RPF: RPM D) none of the above protocol that uses A) unicast
D) none of the above 30. 33. In _______, a logical tunnel multicast routing to create B) multicast
In OSPF, when the link is established by encapsulating source-based trees. The C) broadcast
between two routers is the multicast packet inside a protocol is based on D) none of the above 40. A
broken, the administration unicast packet. _______ routing. one-to-one communication
may create a _________ A) UNIBONE B) A) distance vector between one source and
link between them using a MULTBONE C) B) link state one destination is classified
longer path that probably MBONE C) path vector as a
goes through several D) none of the above D) none of the above _______ communication.
routers. View Answer: 37. RPF eliminates the A) unicast
A) point-to-point ________ in the flooding B) multicast
B) transient process. C) broadcast
D) none of the above 41. B) intradomain routing 48. In OSPF, a ________ C) RPM
A _______ routing table C) both a and b link connects two routers D) none of the above
contains information D) none of the above 45. In without any other host or 52. The task of moving the
entered manually. RPF, a router forwards only the router in between. packet from the input
A) static copy that has traveled the A) point-to-point queue to the output queue
B) dynamic _______ B) transient in a router is done by
C) hierarchical path from the source to C) stub _________.
D) none of the above the router. D) none of the above A) input and output ports
42. PIM-DM is used in a A) shortest 49. In _______ forwarding, B) routing processor
_______ multicast B) longest the routing table holds the C) switching fabrics
environment, such as a C) average address of just the next hop D) none of the above
LAN. D) none of the above 46. In instead of complete route 53. In _______ delivery,
A) dense ________ routing, we assume information. both the deliverer of the IP
B) sparse that there is one node (or A) next-hop packet and the destination
C) a or b more) in each autonomous B) network-specific are on the same network.
D) none of the above system that acts on behalf of C) host-specific D) A) a connectionless
43. In distance vector the entire autonomous default B) a direct C)
routing, each node system. 50. In _______ forwarding, an indirect
periodically shares its A) distant vector the destination address is a D) none of the above
routing table with B) path vector network address in the 54. In _______ forwarding,
_________ and whenever C) link state routing table. the mask and destination
there is a change. D) none of the above 47. A) next-hop addresses are both 0.0.0.0
A) every other node ___________ is an B) network-specific in the routing table.
B) its immediate neighbors interdomain routing protocol C) host-specific D) A) next-hop
C) one neighbor using path vector routing. default B) network-specific
D) none of the above A) BGP View Answer: C) host-specific D)
44. Routing inside an B) RIP 51. Pruning and grafting default
autonomous system is C) OSPF are strategies used in 55. In the _______ tree
referred to as D) none of the above _______. approach, each router
_______________. A) RPF B) needs to have one shortest
A) interdomain routing RPB path tree for each group.
A) group-shared B) which is updated D) none of the above group through a specific
B) source-based automatically View Answer: router.
C) a or b C) either a or b 64. The principle of A) weed
D) none of the above D) none of the above 60. In ________ states that the B) graft
56. The use of hierarchy in ______, the router forwards routing table is sorted from C) prune
routing tables can the received packet through the longest mask to the D) none of the above
________ the size of only one of its interfaces. shortest mask.
the routing tables. A) unicasting A) first mask matching
A) reduce B) multicasting B) shortest mask matching Forouzan: MCQ in Remote
B) increase C) broadcasting C) longest mask matching Logging, Electronic Mail,
C) both a and b D) none of the above D) none of the above and File Transfer
D) none of the above 61. In OSPF, a _______ link is a 65. PIM-SM is used in a 1. When both sender and
57. In _______ routing, the network with several routers _______multicast receiver are connected to a
least cost route between attached to it. environment such as a mail server via a LAN or a
any two nodes is the route A) point-to-point WAN. WAN, we need
with the minimum B) transient A) dense ___________________.
distance. C) stub B) sparse A) two UAs, two pairs of
A) path vector D) none of the above C) a or b MTAs, and a pair of MAAs
B) distance vector 62. The _________ routing D) none of the above 66. B) two UAs, and two pairs
C) link state uses the Dijkstra algorithm to The routing processor of of MTAs
D) none of the above build a routing table. a router performs the C) two UAs, two pairs of
58. Multicast link state A) distance vector ________ layer functions MTAs, and two pairs of
routing uses the _______ B) link state of the router. MAAs
tree approach. C) path vector A) physical and data link D) none of the above
A) source-based D) none of the above 63. B) network 2. The actual mail transfer
B) group-shared An area is _______. C) transport is done through
C) a or b A) part of an AS D) none of the above 67. A ____________.
D) none of the above B) composed of at least _______ message tells an A) UAs
59. A dynamic table is one two ASs upstream router to stop B) MTAs
_______. C) another term for an AS sending multicast C) MAAs
A) with manual entries messages for a specific D) none of the above
3. If the sender wants A) sending; receiving B) character C) retrieve a list
an option enabled by B) request; reply C) line D) none of the above
the receiver, it sends a C) data; control D) none of the above 11. 15. During an FTP session
_______ command. D) none of the above The _______ is software the data connection is
A) WILL 7. In FTP, ASCII, EBCDIC, residing on the remote opened _______.
B) DO C) and image define an system that allows the A) exactly once B)
WONT attribute called _______. remote system to receive exactly twice C) as
D) none of the above A) file type characters from a TELNET many times as
4. When the sender is B) data structure server. necessary
connected to the mail C) transmission mode A) terminal driver D) none of the above
server via a LAN or a WAN, D) none of the above B) pseudoterminal driver 16. In FTP, _______ is the
we need ______________. 8. The third stage in an C) TELNET client service type used by the IP
A) two MTA email transfer needs a D) none of the above protocol because this is an
B) two UAs and two pairs ________ protocol. 12. FTP uses the services of interactive connection
of MTAs A) pull ________. between a user (human)
C) two UAs and a pair of B) push A) UDP and a server.
MTAs C) both a and b B) IP A) maximize throughput
D) none of the above D) none of the above C) TCP B) minimize delay
5. The ________ 9. _______ is the standard D) none of the above 13. C) minimize error
usually contains the mechanism provided by For the control D) none of the above
sender address, the TCP/IP for copying a file connection, FTP uses the 17. When a user wants to
receiver address, and from one host to another. __________ character set. access an application
other information. A) TELNET A) regular ASCII program or utility located
A) message B) B) SMTP B) EBCDIC on a remote machine, he
envelope C) C) TFTP C) NVT ASCII or she performs
both a and b D) none of the above 10. D) none of the above ___________
D) none of the above In the _______ mode, 14. In FTP, when we login. A) local
6. NVT uses two sets of each character typed is _______, it is copied from B) remote C)
characters, one for sent by the client to the the client to the server. temporary
_____and one for server. A) retrieve a file D) none of the above
__________. A) default B) store a file
18. The third stage in an A) SMTP C) a and b C) An agent
email transfer uses a(n) B) SNMP D) none of the above D) none of the above 30.
________ protocol. C) TELNET 26. TELNET is an ________ provides service
A) UA D) none of the above 22. abbreviation for to the user to make the
B) MTA _________ is a supplementary ____________. process of sending and
C) MAA protocol that allows non-ASCII A) terminal network receiving a message easier.
D) none of the above data to be sent through email. B) telephone network A) An MTA
19. TELNET uses only one A) JPEG C) telecommunication B) An MAA
TCP connection. The server B) MPEG network C) A UA
uses ________ port and C) MIME D) none of the above D) none of the above 31.
the client uses ________ D) none of the above 23. 27. When a user logs into a The message contains
port. Which of the following local time-sharing system, it the ________ and the
A) a well-known; services is not provided by a is called ________ login. __________.
another well-known UA? A) local A) header; envelop
B) an ephemeral; another A) composing messages B) remote B) header; body
ephemeral B) reading messages C) temporary C) envelop; body
C) a well-known; an C) replying messages D) none of the above 28. D) none of the above 32. In
ephemeral D) all are Which part of the mail the ____ mode, line editing
D) none of the above 24. If the sender wants to created by the UA contains (echoing, character erasing,
20. For control, NVT uses enable an option, it sends a the sender and receiver line erasing, and so on) is
US ASCII characters with _______ command. names? done by the client.
the highest order bit set to A) WILL A) envelope A) default
______. B) DO B) address B) character
A) 1 B) C) WONT C) header C) line
0 D) none of the above 25. D) none of the above 29. D) none of the above
C) a or b In FTP, when we ________ is part of a 33. The MIME _______
D) none of the above _______, it is copied from the local hard drive, a special header uses text to
21. The formal protocol server to the client. file with permission describe the type of data in
that defines the MTA client A) retrieve a file restrictions. the body of the message.
and server in the Internet is B) retrieve a list A) A message A) content-type
called ___________. B) A response
B) content-transfer- D) none of the above special control character 45. The _______ translates
encoding 38. The _______ translates called ________. local characters into NVT
C) content-description NVT characters into a form A) ICA form.
D) none of the above acceptable by the remote B) IAC A) terminal driver B)
34. If the sender wants to operating system. C) AIC TELNET client C)
disable an option, it sends A) terminal driver B) D) none of the above TELNET server D)
a _______ command. TELNET client C) 42. When the sender and none of the above
A) WILL TELNET server D) the receiver of an email are 46. Currently two message
B) DO C) none of the above on different systems, we access protocols are
WONT 39. When the sender and need only _____________. available: _______ and
D) none of the above the receiver of an email are A) one MTA _________.
35. SMTP is a on the same system, we B) two UAs A) POP3; IMAP2
__________protocol. need only ___________. A) C) two UAs and one pair B) POP4; IMAP1
A) pull one UA of MTAs C) POP3; IMAP4
B) push B) two UAs D) none of the above D) none of the above
C) both a and b C) one UA and one MTA 43. During an FTP session 47. TELNET is a ________
D) none of the above D) none of the above the control connection is client-server application
36. In FTP, there are three 40. In the Internet, the opened _______. program.
types of _______: stream, email address consists of A) exactly once B) A) specific-purpose
block, and compressed. two parts: a _______ and a exactly twice C) as B) general-purpose
A) file types _______. many times as C) both a and b
B) data structures A) local part; domain necessary D) none of the above
C) transmission modes name B) global part; D) none of the above 48. In FTP, a file can be
D) none of the above domain name 44. If the sender wants organized into records,
37. For data, NVT uses US C) label; domain name an option disabled by the pages, or a stream of bytes.
ASCII characters with the D) none of the above receiver, it sends a These are types of an
highest order bit set to 41. To distinguish data _______ command. attribute called _______. A)
______. from control characters, A) WILL file types
A) 1 B) each sequence of control B) DO C) B) data structures
0 characters is preceded by a DONT C) transmission modes
C) a or b D) none of the above D) none of the above
49. The process of C) command-based and A) ciphertext 7. A ________ cipher
transferring a mail message data-based B) plaintext replaces one character
occurs in ________ phases. D) none of the above C) secret-text with another character.
A) two 53. _______ is more D) none of the above A) substitution
B) four powerful and complex than 4. A(n) _______ algorithm B) transposition C)
C) five _______. transforms plaintext to either (a) or (b) D)
D) none of the above A) POP3; IMAP4 ciphertext. neither (a) nor (b)
50. In FTP, the well-known B) IMAP4; POP3 A) encryption 8. The ________ cipher
port ____ is used for the C) SMTP; POP3 B) decryption reorders the plaintext
control connection and the D) none of the above C) either (a) or (b) characters to create a
well-known port ________ D) neither (a) nor (b) ciphertext.
for the data connection. Forouzan: MCQ in 5. The ________ method A) substitution B)
A) 21; 22 Cryptography provides a one-time transposition C)
B) 21; 20 1. One commonly used session key for two parties. either (a) or (b)
C) 20; 21 public-key cryptography A) Diffie-Hellman D) neither (a) nor (b)
D) none of the above method is the ______ B) RSA 9. _______ is a round
51. In the _______ mode, algorithm. C) DES cipher based on the
the echoing is done by the A) RSS D) AES Rijndael algorithm that
client. B) RAS 6. A(n) ______ is a keyless uses a 128-bit block of
A) default C) RSA substitution cipher with N data.
B) character D) RAA inputs and M outputs that A) AEE
C) line 2. A(n) ______ algorithm uses a formula to define B) AED
D) none of the above transforms ciphertext to the relationship between C) AER
52. There are two types of plaintext. the input stream and the D) AES
user agents: _________ A) encryption output stream. 10. The ________is the
and ___________. B) decryption A) S-box original message before
A) command-driven; data- C) either (a) or (b) B) P-box transformation.
driven D) neither (a) nor (b) C) T-box A) ciphertext
B) command-driven; GUI- 3. The ________ is the D) none of the above B) plaintext
based message after C) secret-text
transformation. D) none of the above
11. A modern cipher is B) public 19. ECB and CBC are C) either (a) or (b)
usually a complex C) either a or b ________ ciphers. D) neither (a) nor (b)
_____cipher made of a D) neither (a) nor (b) A) block 23. DES has an initial and
combination of different 15. AES has _____ different B) stream final permutation block
simple ciphers. configurations. C) field and _________ rounds.
A) round A) two D) none of the above A) 14
B) circle B) three 20. A(n) _______is a B) 15
C) square C) four keyless transposition C) 16
D) none of the above D) five cipher with N inputs and M D) none of the above
12. The _________ attack 16. DES is a(n) ________ outputs that uses a table to
can endanger the security method adopted by the define the relationship 24. The DES function has
of the Diffie-Hellman U.S. government. between the input stream _______ components.
method if two parties are A) symmetric-key and the output stream. A) 2
not authenticated to each B) asymmetric-key A) S-box B) 3
other. C) either (a) or (b) B) P-box C) 4
A) man-in-the-middle D) neither (a) nor (b) C) T-box D) 5
B) ciphertext attack 17. DES uses a key D) none of the above 25. In a(n) ________
C) plaintext attack generator to generate 21. ________ DES was cipher, the same key is
D) none of the above sixteen _______ round designed to increase the used by both the sender
13. A combination of an keys. size of the DES key. and receiver.
encryption algorithm and a A) 32-bit A) Double A) symmetric-key
decryption algorithm is B) 48-bit B) Triple B) asymmetric-key
called a ________. C) 54-bit C) Quadruple C) either (a) or (b)
A) cipher D) 42-bit D) none of the above D) neither (a) nor (b)
B) secret 18. The Caesar cipher is a 22. ________ is the science 26. _________ ciphers can
C) key _______cipher that has a and art of transforming be categorized into two
D) none of the above key of 3. messages to make them broad categories:
14. In an asymmetric-key A) transposition secure and immune to monoalphabetic and
cipher, the receiver uses B) additive attacks. polyalphabetic.
the ______ key. C) shift A) Cryptography A) Substitution
A) private D) none of the above B) Cryptoanalysis B) Transposition
C) either (a) or (b) C) key B) decryption 7. A witness used in
D) neither (a) nor (b) D) none of the above 31. In C) hash entity authentication is
27. The _______ cipher is a(n) ________, the key is D) none of the above ____________.
the simplest called the secret key. 4. The secret key between A) something known B)
monoalphabetic cipher. It A) symmetric-key members needs to be something possessed C)
uses modular arithmetic B) asymmetric-key created as a ______ key something inherent D)
with a modulus of 26. C) either (a) or (b) when two members all of the above
A) transposition D) neither (a) nor (b) contact KDC. 8. A _______ message
B) additive Forouzan: MCQ in A) public digest is used as an
C) shift Network Security B) session MDC. A) keyless
D) none of the above 1. Message_____ means C) complimentary D) B) keyed
28. In an asymmetric-key that the data must arrive at none of the above C) either (a) or (b) D)
cipher, the sender uses the receiver exactly as 5. The ________ criterion neither (a) nor (b)
the__________ key. sent. ensures that a message 9. A(n)______ creates a
A) private A) confidentiality cannot easily be forged. secret key only between a
B) public B) integrity A) one-wayness member and the center.
C) either (a) or (b) D) C) authentication B) weak-collision- A) CA
neither (a) nor (b) D) none of the above resistance B) KDC
29. In a(n) ________ 2. Message _______ means C) strong-collision- C) KDD
cipher, a pair of keys is that the receiver is ensured resistance D) none of the above
used. that the message is coming D) none of the above 10. ________ means to
A) symmetric-key from the intended sender, 6. A(n) _____ is a trusted prove the identity of the
B) asymmetric-key not an imposter. third party that assigns a entity that tries to access
C) either (a) or (b) A) confidentiality symmetric key to two the system’s resources.
D) neither (a) nor (b) B) integrity parties. A) Message authentication
30. The _______ is a C) authentication A) KDC B) Entity authentication C)
number or a set of D) none of the above B) CA Message confidentiality D)
numbers on which 3. A(n) ________function C) KDD none of the above View
the cipher operates. creates a message digest D) none of the above Answer:
A) cipher out of a message. 11. A ________ signature is
B) secret A) encryption included in the document;
a _______ signature is a B) MAC A) symmetric-key verifier by using one of the
separate entity. C) either (a) or (b) B) asymmetric-key three kinds of witnesses.
A) conventional; digital D) neither (a) nor (b) C) either (a) or (b) A) message authentication
B) digital; digital 16. A(n) _________ can be D) neither (a) nor (b) 20. B) entity authentication
C) either (a) or (b) used to preserve the A(n) ________is a federal C) message confidentiality
D) neither (a) nor (b) integrity of a document or or state organization that D) message integrity
a message. binds a public key to an 24. The _______ criterion
12. If _________ is needed, A) message digest B) entity and issues a states that it must be
a cryptosystem must be message summary C) certificate. extremely difficult or
applied over the scheme. encrypted message A) KDC impossible to create the
A) integrity D) none of the above B) Kerberos message if the message
B) confidentiality 17. Challenge-response C) CA digest is given.
C) nonrepudiation authentication can be done D) none of the above A) one-wayness
D) authentication using ________. 21. Message ________ B) weak-collision-
13. Digital signature A) symmetric-key ciphers means that the sender and resistance
provides ________. B) asymmetric-key ciphers the receiver expect privacy. C) strong-collision-
A) authentication B) C) keyed-hash functions A) confidentiality resistance
nonrepudiation C) D) all of the above B) integrity D) none of the above
both (a) and (b) D) 18. The _______criterion C) authentication 25. A(n) ______ is a
neither (a) nor (b) ensures that we cannot D) none of the above hierarchical system that
14. Digital signature cannot find two messages that 22. In ________ answers queries about key
provide ________ for the hash to the same digest. authentication, the certification.
message. A) one-wayness claimant proves that she A) KDC
A) integrity B) weak-collision- knows a secret without B) PKI
B) confidentiality resistance actually sending it. C) CA
C) nonrepudiation C) strong-collision- A) password-based D) none of the above
D) authentication resistance B) challenge-response 26. _________ means that
15. To authenticate the D) none of the above C) either (a) or (b) a sender must not be able
data origin, one needs a(n) 19. A digital signature D) neither (a) nor (b) to deny sending a message
_______. needs a(n)_________ 23. In _______, a claimant that he sent.
A) MDC system. proves her identity to the A) Confidentiality
B) Integrity 1. _________ operates in from any application layer 9. ______ is the protocol
C) Authentication the transport mode or the protocol, but the protocol designed to create security
D) Nonrepudiation tunnel mode. is normally HTTP. associations, both inbound
27. A hash function A) IPSec A) SSL and outbound.
must meet ________ B) SSL B) TLS A) SA
criteria. A) two C) PGP C) either (a) or (b) B) CA
B) three D) none of the above D) both (a) and (b) C) KDC
C) four 6. IKE is a complex protocol D) IKE
D) none of the above 2. IKE creates SAs for based on ______ other 10. A _______network
28. __________ is a _____. protocols. is used inside an
popular session key creator A) SSL A) two organization.
protocol that requires an B) PGP B) three A) private
authentication server and a C) IPSec C) four B) public
ticket-granting server. D) VP D) five C) semi-private
A) KDC 3. ______ provides 7. IPSec defines two D) semi-public
B) Kerberos either authentication or protocols: _______ and 11. SSL provides
C) CA encryption, or both, for ________. _________.
D) none of the above packets at the IP level. A) A) AH; SSL A) message integrity
29. Password-based AH B) PGP; ESP B) confidentiality C)
authentication can be B) ESP C) AH; ESP compression
divided into two broad C) PGP D) all of the above D) all of the above
categories: _______ and D) SSL 8. In the ______ mode, 12. The Internet authorities
_______. 4. One security protocol for IPSec protects information have reserved addresses
A) fixed; variable the e-mail system is delivered from the for _______.
B) time-stamped; fixed _________. transport layer to the A) intranets
C) fixed; one-time A) IPSec B) network layer. B) internets
D) none of the above SSL A) transport C) extranets
Forouzan: MCQ in Security C) PGP B) tunnel D) none of the above
in the Internet: IPSec, D) none of the above C) either (a) or (b) D) 13. An _________ is
SSL/TLS, PGP, VPN, and 5. Typically, ______ can neither (a) nor (b) a network that allows
Firewalls receive application data
authorized access from A) intranet A) VPP D) none of the above
outside users. B) internet B) VNP 26. ______ provides
A) intranet C) extranet C) VNN authentication at the IP
B) internet D) none of the above 18. D) VPN level.
C) extranet ______ is actually an 22. _______ uses the idea A) AH
D) none of the above 14. IETF version of _____. of certificate trust levels. B) ESP
_________ is a collection A) TLS; TSS A) X509 C) PGP
of protocols designed by B) SSL; TLS B) PGP D) SSL
the IETF (Internet C) TLS; SSL C) KDC 27. In _______, the
Engineering Task Force) to D) SSL; SLT D) none of the above cryptographic algorithms
provide security for a 19. In ______, there is a 23. IPSec in the ______ and secrets are sent with
packet at the network single path from the fully mode does not protect the the message.
level. trusted authority to any IP header. A) IPSec
A) IPSec certificate. A) transport B) SSL
B) SSL A) X509 B) tunnel C) TLS
C) PGP B) PGP C) either (a) or (b) D) D) PGP
D) none of the above C) KDC neither (a) nor (b) 28. ______ is designed to
15. IKE uses _______. D) none of the above 24. ________ provides provide security and
A) Oakley 20. The combination of key privacy, integrity, and compression services to
B) SKEME exchange, hash, and authentication in e-mail. data generated from the
C) ISAKMP encryption algorithms A) IPSec application layer.
D) all of the above defines a ________ for B) SSL A) SSL
16. IPSec uses a set of each SSL session. C) PGP B) TLS
SAs called the ________. A) list of protocols D) none of the above C) either (a) or (b)
A) SAD B) cipher suite 25. In _____, there can be D) both (a) and (b) 29.
B) SAB C) list of keys multiple paths from fully or _______ provide
C) SADB D) none of the above 21. partially trusted security at the
D) none of the above 17. A ______ provides privacy authorities. transport layer.
An ________ is a private for LANs that must A) X509 A) SSL
network that uses the communicate through the B) PGP B) TLS
Internet model. global Internet. C) KDC C) either (a) or (b)
D) both (a) and (b) 34. In PGP, to exchange e-
30. The _______ mode is mail messages, a user
normally used when we needs a ring of _______
need host-to-host (end-to- keys.
end) protection of data. A) A) secret
transport B) public
B) tunnel C) either (a) or (b)
C) either (a) or (b) D) D) both (a) and (b)
neither (a) nor (b)
31. In the _______ mode,
IPSec protects the whole IP GOODLUCK SA EXAM
packet, including the BABY! GALINGAN MO AH!
original IP header. PANCIT BIHON IS ON THE
A) transport LINE!
B) tunnel I LOVE YOU BABY!
C) either (a) or (b) D)
neither (a) nor (b)
32. ______ was invented
by Phil Zimmerman.
A) IPSec
B) SSL
C) PGP
D) none of the above
33. A _______ layer
security protocol provides
end-to-end security
services for applications.
A) data link
B) network
C) transport
D) none of the above

You might also like