Computer Networking interview questions part 5

Computer Networking interview questions part 5

Take as many assements as you can to improve your validate your skill rating

Total Questions: 20

1. Which protocol is a signaling communication protocol used for controlling multimedia communication sessions?

Correct Answer is : session initiation protocol

2. Which one of the following is not correct?

Correct Answer is : All of the mentioned

3. When displaying a web page, the application layer uses the _____________

Correct Answer is : HTTP protocol

4. Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?

Correct Answer is : ESP transport mode

5. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Correct Answer is : Both SHA and MD5

6. Which two types of IPsec can be used to secure communications between two LANs?

Correct Answer is : Both AH tunnel mode and ESP tunnel mode

7. ______ provides authentication at the IP level.

Correct Answer is : AH

8. IPsec defines two protocols: _______ and ________

Correct Answer is : AH; ESP

9. IP Security operates in which layer of the OSI model?

Correct Answer is : Network

10. ESP provides

Correct Answer is : all of the mentioned

11. In computer security… means that computer system assets can be modified only by authorized parities.

Correct Answer is : Integrity

12. In computer security… means that the information in a computer system only be accessible for reading by authorized parities.

Correct Answer is : Confidentiality

13. Which of the following organizations is primarily concerned with military encryption systems?

Correct Answer is : NSA

14. Which of the following is not a characteristic of Virtual Circuit Network?

Correct Answer is : Virtual circuit network is implemented in application layer

15. The address that is unique in the scope of the network or internationally if the network is part of an international network is called as

Correct Answer is : Global address

16. The Identifier that is used for data transfer in virtual circuit network is

Correct Answer is : Virtual circuit identifier

17. Which of the following is not a phase of virtual circuit network?

Correct Answer is : Termination phase

18. Steps required in setup process are

Correct Answer is : Setup request and acknowledgement

19. During teardown phase, source after sending all the frames to destination sends……..to notify termination

Correct Answer is : Teardown request

20. Delay if, resource allocated during setup phase during data transfer is

Correct Answer is : Same for each packet

Similar Interview Questions

    Search for latest jobs

    Icon
    Icon