JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing Firm
Direct Client
Computer Networking interview questions part 5
Computer Networking interview questions part 5
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 20
1. Which protocol is a signaling communication protocol used for controlling multimedia communication sessions?
A. session initiation protocol
B. session modelling protocol
C. session maintenance protocol
D. resource reservation protocol
Show Correct Answer
Correct Answer is :
session initiation protocol
2. Which one of the following is not correct?
A. Application layer protocols are used by both source and destination devices during a communication session
B. HTTP is a session layer protocol
C. TCP is an application layer protocol
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
3. When displaying a web page, the application layer uses the _____________
A. HTTP protocol
B. FTP protocol
C. SMTP protocol
D. TCP protocol
Show Correct Answer
Correct Answer is :
HTTP protocol
4. Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?
A. AH transport mode
B. ESP transport mode
C. ESP tunnel mode
D. AH tunnel mode
Show Correct Answer
Correct Answer is :
ESP transport mode
5. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
A. Kerberos V5
B. SHA
C. MD5
D. Both SHA and MD5
Show Correct Answer
Correct Answer is :
Both SHA and MD5
6. Which two types of IPsec can be used to secure communications between two LANs?
A. AH tunnel mode
B. ESP tunnel mode
C. Both AH tunnel mode and ESP tunnel mode
D. ESP transport mode
Show Correct Answer
Correct Answer is :
Both AH tunnel mode and ESP tunnel mode
7. ______ provides authentication at the IP level.
A. AH
B. ESP
C. PGP
D. SSL
Show Correct Answer
Correct Answer is :
AH
8. IPsec defines two protocols: _______ and ________
A. AH; SSL
B. PGP; ESP
C. AH; ESP
D. All of the mentioned
Show Correct Answer
Correct Answer is :
AH; ESP
9. IP Security operates in which layer of the OSI model?
A. Network
B. Transport
C. Application
D. Physical
Show Correct Answer
Correct Answer is :
Network
10. ESP provides
A. source authentication
B. data integrity
C. privacy
D. all of the mentioned
Show Correct Answer
Correct Answer is :
all of the mentioned
11. In computer security… means that computer system assets can be modified only by authorized parities.
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Show Correct Answer
Correct Answer is :
Integrity
12. In computer security… means that the information in a computer system only be accessible for reading by authorized parities.
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Show Correct Answer
Correct Answer is :
Confidentiality
13. Which of the following organizations is primarily concerned with military encryption systems?
A. NSA
B. NIST
C. IEEE
D. ITU
Show Correct Answer
Correct Answer is :
NSA
14. Which of the following is not a characteristic of Virtual Circuit Network?
A. There are setup and teardown phases in addition to the data transfer phase
B. Resources can be allocated during setup phase or on demand
C. All packets follow the same path established during the connection
D. Virtual circuit network is implemented in application layer
Show Correct Answer
Correct Answer is :
Virtual circuit network is implemented in application layer
15. The address that is unique in the scope of the network or internationally if the network is part of an international network is called as
A. Global address
B. Network address
C. Physical address
D. IP address
Show Correct Answer
Correct Answer is :
Global address
16. The Identifier that is used for data transfer in virtual circuit network is
A. Global address
B. Virtual circuit identifier
C. Network identifier
D. IP identifier
Show Correct Answer
Correct Answer is :
Virtual circuit identifier
17. Which of the following is not a phase of virtual circuit network?
A. Setup phase
B. Datatransfer phase
C. Termination phase
D. Teardown phase
Show Correct Answer
Correct Answer is :
Termination phase
18. Steps required in setup process are
A. Setup request and acknowledgement
B. Setup request and setup response
C. Setup request and setup termination
D. Setup and termination steps
Show Correct Answer
Correct Answer is :
Setup request and acknowledgement
19. During teardown phase, source after sending all the frames to destination sends……..to notify termination
A. Teardown response
B. Teardown request
C. Termination request
D. Termination response
Show Correct Answer
Correct Answer is :
Teardown request
20. Delay if, resource allocated during setup phase during data transfer is
A. Constant
B. Increases for each packet
C. Same for each packet
D. Different for each packet
Show Correct Answer
Correct Answer is :
Same for each packet
Similar Interview Questions
Search for latest jobs
Find Jobs