This multiple choice question document tests knowledge of data communication and networking concepts. It contains questions about topics like network layers, protocols, topologies, and standards organizations. The questions have multiple choice answers to select from like A) regional B) local C) national and international D) all of the above.
This multiple choice question document tests knowledge of data communication and networking concepts. It contains questions about topics like network layers, protocols, topologies, and standards organizations. The questions have multiple choice answers to select from like A) regional B) local C) national and international D) all of the above.
This multiple choice question document tests knowledge of data communication and networking concepts. It contains questions about topics like network layers, protocols, topologies, and standards organizations. The questions have multiple choice answers to select from like A) regional B) local C) national and international D) all of the above.
This multiple choice question document tests knowledge of data communication and networking concepts. It contains questions about topics like network layers, protocols, topologies, and standards organizations. The questions have multiple choice answers to select from like A) regional B) local C) national and international D) all of the above.
Download as DOC, PDF, TXT or read online from Scribd
Download as doc, pdf, or txt
You are on page 1of 28
Forouzan: MCQ in B) multipoint D) Transmission B) half-duplex
Introduction to Data C) point-to-point 9. ________ defines how a C) full-duplex
Communications D) secondary particular pattern to be D) all of the above and Networking 5. Which topology requires interpreted, and what 13. _______ are special- 1. There are a multipoint connection? action is to be taken based interest groups that quickly ______________ Internet A) Bus on that interpretation. test, evaluate, and service providers. B) Star A) Syntax standardize new A) regional C) Mesh B) Semantics technologies. B) local D) Ring C) Timing A) Standards organizations C) national and 6. A ________ is a set of D) None of the above B) Regulatory agencies international rules that governs data C) Forums D) all of the above communication. 10. Frequency of failure D) All of the above 2. ______ refers to the A) protocol and network recovery time 14. Which agency physical or logical B) forum after a failure are measures developed standards for arrangement of a network. C)standard of the _______of a physical connection A) Topology D) none of the above network. interfaces and electronic B) Mode of operation 7. In a ______ connection, A) Performance signaling specifications? C) Data flow two and only two devices B) Security A) ISO D) None of the above are connected by a C) Reliability B) ITU-T 3. A ______ is a data dedicated link. D) Feasibility C) ANSI communication system A) multipoint 11. A television broadcast D) EIA spanning states, countries, B) point-to-point is an example of _______ 15. A _______ is a data or the whole world. C) (a) and (b) transmission. communication system A) MAN D) none of the above A) half-duplex within a building, plant, B) WAN 8. The information to be B) simplex or campus, or between C) LAN communicated in a data C) full-duplex nearby buildings. D) none of the above communications system is D) automatic A) LAN 4. A _______ connection the _______. 12. Data flow between two B) MAN provides a dedicated link A) Medium devices can occur in a C) WAN between two devices. B) Protocol _______ way. D) none of the above A) primary C) Message A) simplex 16. _______ refers to two A) A WAN ______________ data, meaning the order in characteristics: when data B) An internet transmission. which they are presented. should be sent and how C) A LAN A) simplex A) Semantics fast it can be sent. D) None of the above B) half-duplex B) Syntax A) Semantics 21. In a ________ C) full-duplex C) Timing B) Timing connection, three or more D) automatic D) All of the above C) Syntax devices share a link. 25. Which topology 29. An unauthorized user is D) none of the above A) point-to-point requires a central a network _______ issue. 17. This was the first B) multipoint controller or hub? A) Security network. C) (a) and (b) A) Mesh B) Reliability A) CSNET D) none of the above B) Bus C) Performance B) NSFNET 22. Which organization has C) Star D) All the above C) ARPANET authority over interstate D) Ring 30. ________ is an idea or D) ANSNET and international 26. The _______ is the concept that is a precursor 18. Devices may be commerce in the physical path over which a to an Internet standard. arranged in a _____ communications field? message travels. A) RCF topology. A) FCC A) Protocol B) ID A) mesh B) IEEE B) Signal C) RFC B) ring C) ITU-T C) Medium D) none of the above C) bus D) ISOC D) All the above 31. In _______ D) all of the above 23. In the original 27. In a _______ transmission, the channel 19. _______ is the protocol ARPANET, _______ were connection, more than two capacity is shared by both suite for the current directly connected devices can share a single communicating devices at Internet. together. link. all times. A) UNIX A) routers A) multipoint A) simplex B) NCP B) host computers B) point-to-point B) half-duplex C) TCP/IP C) networks C) primary C) full-duplex D) ACM D) IMPs D) secondary D) half-simplex 20. ________ is a collection 24. Communication 28. _______ refers to the of many separate between a computer and a structure or format of the Forouzan: MCQ in networks. keyboard involves Network Models Set 1 1. The ______ layer adds C) ARP A) user C) both a and b a header to the packet D) none of the above B) network D) none of the above coming from the upper 5. The process-to-process C) both (a) and (b) 13. The _______ layer links layer that includes the delivery of the entire D) neither (a) nor (b) the network support layers logical addresses of the message is the 9. The physical, data link, and the user support sender and receiver. responsibility of the and network layers are the layers. A) data link _______ layer. ______ support layers. A) session B) network A) Transport A) network B) transport C) physical B) Application B) user C) data link D) none of the above C) Physical C) both (a) and (b) D) network 2. Which of the following is D) Network D) neither (a) nor (b) 14. ICMPv6 includes an application layer 6. The ______ layer is 10. The ________ layer is _______. service? responsible for moving responsible for the A) IGMP A) File transfer and access frames from one hop process-to-process delivery B) ARP B) Mail service (node) to the next. of the entire message. C) RARP C) Remote log-in A) transport A) transport D) a and b D) All the above B) data link B) physical 15. The ____ address 3. When data are C) physical C) network uniquely defines a host transmitted from device A D) none of the above D) data link on the Internet. to device B, the header 7. The _______ layer is 11. The _______ layer lies A) IP from A’s layer 4 is read by responsible for delivering between the network layer B) port B’s _______ layer. data units from one station and the application layer. C)specific A) Transport to the next without errors. A) Data link D) physical B) Application A) physical B) Transport 16. The _______ layer C) Physical B) data link C) Physical coordinates the functions D) None of the above C) transport D) None of the above required to transmit a bit 4. __________ provides D) network 12. The Internetworking stream over a physical full transport layer services 8. The session, Protocol (IP) is a ________ medium. to applications. presentation, and protocol. A) data link A) UDP application layers are the A) connection-oriented B) transport B) TCP ____ support layers. B) reliable C) network D) physical C) Data link Forouzan: MCQ in movement of _______ 17. The ______ layer is D) None of the above Network Models Set 2 over the physical medium. responsible for the source- 21. IPv6 has _______ 25. The TCP/IP _______ A) dialogs to-destination delivery of a -bit addresses. layer is equivalent to the B) protocols packet across multiple A) 128 combined session, C) bits network links. B) 32 presentation, and D) programs A) network C) 64 application layers of the 29. To deliver a message to B) physical D) variable OSI model. the correct application C) data link 22. The_____ address A) data link program running on a host, D) transport identifies a process on a B) network the _______ address must 18. Mail services are host. C) physical be consulted. available to network users A) specific D) application A) physical through the _______ layer. B) port 26. When a host on B) port A) Transport C) IP network A sends a message C) IP B) Physical D) physical to a host on network B, D) none of the above C) Data link 23. The_________ layer is which address does the 30. Ethernet uses a ______ D) Application responsible for the delivery router look at? physical address that is 19. The ____ created a of a message from one A) logical imprinted on the network model called the Open process to another. B) physical interface card (NIC). Systems Interconnection, A) transport C) port A) 32-bit which allows diverse B) network D) none of the above B) 6-byte systems to communicate. C) physical 27. As the data packet C) 64-bit A) IEEE D) none of the above moves from the upper to D) none of the above B) ISO 24. The _________ layer the lower layers, headers 31. The _______ layer is C) OSI enables the users to access are _______. the layer closest to the D) none of the above the network. A) Rearranged transmission medium. 20. The _______ layer A) application B) Removed A) Network changes bits into B) physical C) Added B) Transport electromagnetic signals. C) data link D) Modified C) Physical A) Physical D) transport 28. The physical layer is D) Data link B) Transport concerned with the 32. The OSI model consists C) Manufacturers disliked 39. The Internet model interactions between of _______ layers. the TCP/IP protocol suite. consists of _______ layers. communicating devices. A) eight D) None of the above A) Eight A) session B) seven 36. In the OSI model, as a B) Seven B) physical C) five data packet moves from C) Five C) transport D) three the lower to the upper D) Three D) network 33. The ________ address, layers, headers are 40. In the OSI model, 43. A port address in also known as the link _______. what is the main function TCP/IP is ______ bits long. address, is the address of a A) removed of the transport layer? A) 16 node as defined by its LAN B) added A) process-to-process B) 32 or WAN. C) rearranged message delivery C) 48 A) IP D) modified B) node-to-node delivery D) none of the above B) port 37. In the OSI model, when C) synchronization 44. In the OSI model, C) specific data is transmitted from D) updating and encryption and decryption D) physical device A to device B, the maintenance of routing are functions of the 34. Layer 2 lies between header from A’s layer 5 is tables ________ layer. the physical layer and the read by B’s _______ layer. 41. _______ is a process- A) application _______ layer. A) session to-process protocol that B) presentation A) Data link B) physical adds only port addresses, C) session B) Transport C) transport checksum error control, D) transport C) Network D) presentation and length information to 45. TCP/IP is a ______ D) None of the above 38. The seven-layer _____ the data from the upper hierarchical protocol suite 35. Why was the OSI model model provides guidelines layer. developed ____ the OSI developed? for the development of A) IP model. A) The rate of data universally compatible B) TCP A) five-layer; before transfer was increasing networking protocols. C) UDP B) six-layer; before exponentially A) ISO D) none of the above C) seven-layer; before B) Standards were needed B) OSI 42. The ______ layer D) five-layer; after to allow any two systems C) IEEE establishes, maintains, and 46. The ________ address, to communicate D) none of the above synchronizes the also known as the link address, is the address of a node as defined by its LAN B) two’s complement C) Hamming distance D) Two-dimensional parity or WAN. arithmetic D) none of the above 6. check A) logical C) either (a) or (b) The _______ of a 10. In _____ coding, we B) port D) none of the above 2. polynomial is the highest divide our message into C) physical The checksum of 1111 power in the polynomial. blocks, each of k bits, D) none of the above and 1111 is _________. A) range called ___. 47. The _______ model A) 0000 B) power A) block; blockwords shows how the network B) 1111 C) degree B) block; datawords functions of a computer C) 1110 D) none of the above C) linear; datawords ought to be organized. D) 0111 7. In modulo-2 arithmetic, D) none of the above A) ANSI 3. In modulo-11 __________ give the same 11. A _____ error means B) CCITT arithmetic, we use only the results. that two or more bits in the C) ISO integers in the range A) addition data unit have changed. D) OSI ______, inclusive. and subtraction A) burst 48. The _______ layer A) 1 to 10 B) addition and B) double-bit ensures interoperability B) 0 to 10 multiplication C) single-bit between communicating C) 1 to 11 C) addition and division D) none of the above devices through D) none of the above D) none of the above 8. 12. Adding 1 and 1 in transformation of data into 4. In cyclic redundancy In cyclic redundancy modulo-2 arithmetic a mutually agreed upon checking, the divisor is checking, what is the CRC? results in _________. format. _______ the CRC. A) The quotient A) 0 A) network A) one bit less than B) The dividend B) 1 B) presentation B) one bit more than C) The divisor C) 2 C) transport C) The same size as D) The remainder D) none of the above D) data link D) none of the above 5. 9. Which error detection 13. In ________ error Forouzan: MCQ in Error The ________ between method consists of just one correction, the receiver Detection and Correction two words is the number of redundant bit per data corrects errors without 1. Checksums use differences between unit? requesting retransmission. _________ arithmetic. corresponding bits. A) CRC A) onward A) one’s complement A) Hamming rule B) Checksum B) forward arithmetic B) Hamming code C) Simple parity check C) backward D) none of the above C) ORing B) 6 D) none of the above 14. If the Hamming D) none of the above C) 5 26. In block coding, if n = 5, distance between a 18. In ________ error D) none of the above the maximum Hamming dataword and the correction, the receiver 22. The _____of errors is distance between two corresponding codeword is asks the sender to send the more difficult than the codewords is ________. A) three, there are _____ bits data again. ______. 5 in error. A) forward A) detection; correction B) 3 A) 5 B) backward B) correction; detection C) 2 B) 4 C) retransmission C) creation; correction D) none of the above C) 3 D) none of the above D) creation; detection 27. Which error detection D) none of the above 19. We can divide coding 23. In block coding, if k = 2 method uses one’s 15. A simple parity- schemes into two broad and n = 3, we have complement arithmetic? check code can detect categories: ________ and _______ invalid A) Checksum __________ errors. ______coding. codewords. B) CRC A) an odd-number of A) linear; nonlinear A) 4 C) Simple parity check B) an even-number of B) block; convolution B) 8 D) Two-dimensional parity C) two C) block; linear C) 2 check D) no errors D) none of the above D) none of the above 28. The divisor in a cyclic 16. The Hamming 20. In modulo-2 arithmetic, 24. The checksum of 0000 code is normally called the distance between equal we use only ______. and 0000 is __________. _________. codewords is _________. A) 1 and 2 A) 0000 A) redundancy A) 0 B) 0 and 1 B) 1111 B) degree B) 1 C) 0 and 2 C) 0111 C) generator C) n D) none of the above D) 1110 D) none of the above D) none of the above 21. To guarantee correction 25. In one’s complement 29. In modulo-2 arithmetic, 17. In a linear block code, of up to 5 errors in all cases, arithmetic, if positive 7 is we use the ______ the _______ of any two the minimum Hamming 0111, then negative 7 is operation for both addition valid codewords creates distance in a block code ________. and subtraction. another valid codeword. must be A) 1101 A) OR A) ANDing ________. B) 1000 B) XOR B) XORing A) 11 C) 1111 C) AND D) none of the above a codeword is rotated, the result B) 7 6. HDLC is an acronym for 30. We add r redundant is another codeword. C) 5 _______. bits to each block to make A) Convolution D) any of the above A) Half-duplex digital link the length n = k + r. The B) Cyclic 3. The Stop-And-Wait combination resulting n-bit blocks are C) Non-linear ARQ, Go-Back-N ARQ, and B) Host double-level called _________. D) none of the above the Selective Repeat ARQ circuit A) codewords 34. The Hamming distance are for ______ channels. C) High-duplex line B) datawords between 100 and 001 is A) noiseless communication C) blockwords ________. A) B) noisy D) High-level data link D) none of the above 0 C) either (a) or (b) D) control 31. To guarantee the B) 1 C) 2 neither (a) nor (b) 7. In Selective Repeat ARQ, detection of up to 5 errors D) none of the above 4. The _________Protocol, if 5 is the number of bits in all cases, the minimum Forouzan: MCQ in Data adds a simple error control for the sequence number, Hamming distance in a Link Control mechanism to the then the maximum size of block code must be 1. In Go-Back-N ARQ, if 5 is the _______Protocol. the receive window must _______. number of bits for the A) Selective Repeat ARQ; be _____. A) 11 sequence number, then the Go-Back-N ARQ A) 1 B) 5 maximum size of the receive B) Go-Back-N ARQ; Stop- B) 15 C) 6 window must be and-Wait C) 16 D) none of the above _______. A) C) Stop-and-Wait ARQ; D) 31 32. A generator that 1 B) 15 C) 16 Stop-and-Wait 8. In Go-Back-N ARQ, if 5 contains a factor of ____ D) 31 D) none of the above is the number of bits for can detect all odd- 5. In PPP, the ________ is the sequence number, numbered errors. 2. In Go-Back-N ARQ, if frames responsible for then the maximum size of A) x 4, 5, and 6 are received establishing, maintaining, the send window must be B) 1 successfully, the receiver may configuring, and _____. C) x + 1 send an ACK terminating links. A) 1 B) D) none of the above _______ to the sender. A) A) PAP B) 15 C) 33. _______codes are 6 CHAP C) 16 D) special linear block codes LCP D) 31 with one extra property. If NCP 9. In Stop-and-Wait ARQ, 12. In the Go-Back-N Protocol, 16. In _________, the Protocol (PPP), which is a the acknowledgment if the size of the sequence configuration is balanced. _________protocol. number always announces number field is 8, the The link is point-to-point, A) byte-oriented in ______ arithmetic the sequence numbers are in and each station can B) bit-oriented sequence number of the ________ arithmetic, A) function as a primary and a C) character-oriented next frame expected. modulo-256 secondary. D) none of the above A) modulo-m B) modulo- 8 C) A) ARM 20. For Stop-and-Wait ARQ, B) modulo-2 modulo-2 B) ABM for 10 data packets sent, C) modulo-4 D) none of the above C) NBM _______ acknowledgments D) none of the above 13. ______ control refers to D) NRM are needed. 10. In Selective Repeat methods of error detection 17. Byte stuffing means A) less than 10 ARQ, if 5 is the number of and correction. A) Flow adding a special byte to the B) more than 10 bits for the sequence B) Error data section of the frame C) exactly 10 number, then the C) Transmission when there is a character D) none of the above maximum size of the send D) none of the above with the same pattern as 21. _________framing uses window must be _____. 14. In a Go-Back-N ARQ, if the the ______. two categories of A) 1 window size is 63, what is the A) trailer protocols: character- B) 15 range of sequence numbers? B) flag C) oriented and bit-oriented. C) 16 A) 1 to 63 B) 1 header A) Standard D) 31 to 64 C) 0 to D) none of the above B) Fixed-size C) 11. _______ control refers 63 D) 0 to 64 18. The ______ Protocol Variable-size to a set of procedures used 15. Both Go-Back-N and has neither flow nor error D) None of the above to restrict the amount of Selective-Repeat Protocols use control. 22. _______ control refers data that the sender can a _________. A) Selective-Repeat ARQ to a set of procedures used send before waiting for A) sliding window B) B) Go-Back-N ARQ to restrict the amount of acknowledgment. sliding frame C) sliding C) Stop-and-Wait data that the sender can A) Flow packet D) Simplest send before waiting for B) Error D) none of the above 19. The most common acknowledgment. C) Transmission protocol for point-to-point A) Flow D) none of the above access is the Point-to-Point B) Error C) Transmission D) none of the above C) NRM when there is a sequence D) Go-Back-N ARQ 23. In a ________ protocol, D) ABM of bits with the same 34. In Stop-and-Wait ARQ, the data section of a frame 27. In a _________ pattern as the ________. we use sequence numbers is a sequence of characters. protocol, the data section of a A) trailer to number the frames. The A) bit-oriented frame is a sequence of bits. B) flag sequence numbers are B) character-oriented A) bit-oriented B) C) header based on C) either (a) or (b) byte-oriented C) D) none of the above __________arithmetic. D) none of the above either (a) or (b) 31. In the A) modulo-m 24. In _______ framing, D) none of the above _________Protocol, if no B) modulo-2 there is no need for 28. In ________ framing, we acknowledgment for a C) modulo-4 defining the boundaries of need a delimiter (flag) to frame has arrived, we D) none of the above frames. define the boundary of two resend all outstanding 35. In the _____ Protocol, A) standard B) frames. frames. the sender sends its frames fixed-size C) A) standard B) A) Go-Back-N ARQ one after another with no variable-size fixed-size C) B) Selective-Repeat ARQ regard to the receiver. D) none of the above variable-size C) Stop-and-Wait ARQ A) Simplest 25. The _______Protocol D) none of the above D) none of the above B) Selective-Repeat ARQ has both flow control and 29. High-level Data Link 32. The Simplest Protocol C) Stop-and-Wait error control. Control (HDLC) is a and the Stop-and-Wait D) Go-Back-N ARQ A) Stop-and-Wait _______ protocol for Protocol are for ______ 36. _________control in B) Selective-Repeat ARQ communication over point-to- channels. the data link layer is based C) Go-Back-N ARQ point and multipoint links. A) noiseless on automatic repeat D) both (b) and (c) A) byte-oriented B) B) noisy request, which is the 26. In _________, the bit-oriented C) either (a) or (b) retransmission of data. station configuration is C) character-oriented D) D) neither (a) nor (b) A) Flow unbalanced. We have one none of the above 33. The _______Protocol B) Error primary station and 30. Bit stuffing means adding has flow control, but not C) Transmission multiple secondary an extra 0 to the data section error control. D) none of the above stations. of the frame A) Selective-Repeat ARQ 37. In PPP, _______ is a A) ARM B) Stop-and-Wait three-way hand-shaking B) NBM C) Simplest authentication protocol in which the password is kept C) character-oriented; bit 44. _______ in the data Forouzan: MCQ in secret; it is never sent stuffing link layer separates a Connecting LANs, online. D) none of the above message from one source Backbone Networks, A) PAP 41. In the _____ Protocol, to a destination, or from and Virtual LANs B) LCP the sender sends one other messages going from 1. VLANs create _________ C) NCP frame, stops until it other sources to other domains. D) CHAP receives confirmation from destinations. A) multicast 38. In PPP, ________ is a the receiver, and then A) Controlling B) broadcast simple authentication sends the next frame. B) Framing C) C) unicast procedure with a two-step A) Simplest Digitizing D) none of the above process: B) Stop-and-Wait D) none of the above 2. A ________ operates in A) CHAP C) Selective-Repeat ARQ 45. Data link control deals both the physical and the B) PAP C) D) Go-Back-N ARQ with the design and data link layer. LCP D) 42. Stop-and-Wait ARQ is a procedures for ______ A) router B) NCP special case of Go-Back-N communication. bridge C) 39. In the _________ ARQ in which the size of A) node-to-node repeater D) protocol we avoid the send window is ___. A) B) process-to-process passive hub unnecessary transmission 1 C) host-to-host 3. A _______ is a device by sending only frames B) 2 D) none of the above that operates only in the that are corrupted. C) 8 46. In _________ physical layer. A) Selective-Repeat ARQ D) none of the above protocols, we use A) bridge B) Stop-and-Wait ARQ C) 43. ARQ stands for ________. B) router Go-Back-N ARQ _______. A) bit-oriented; character C) passive hub D) none of the above A) Acknowledge repeat stuffing D) repeater 40. In ________ protocols, request B) character-oriented; bit 4. A ______ switch is a we use ________. B) Automatic stuffing faster and more A) byte-oriented; bit retransmission request C) character-oriented; sophisticated router. stuffing C) Automatic repeat byte stuffing A) two-layer B) bit-oriented; bit quantization D) none of the above B) four-layer C) stuffing D) Automatic repeat three-layer request D) none of the above 5. _________ is just a D) none of the above D) none of the above C) simple connector. 9. In a(n) _______ 13. ________ is actually D) none of the above A) A passive hub configuration, the a multiport repeater. It is 17. A virtual local area B) An active hub administrator types the normally used to create network (VLAN) is C) either (a) or (b) port numbers, the IP connections between configured by _________. D) neither (a) nor (b) addresses, or other stations in a physical star A) hardware 6. A ______ normally characteristics, using the topology. B) physical wiring connects LANs and WANs VLAN software. A) A passive hub C) software in the Internet and has a A) automatic B) An active hub D) none of the above table that is used for B) manual C) either (a) or (b) 18. A ________ is making decisions about the C) semiautomatic D) neither (a) nor (b) normally a computer that route. D) none of the above 14. In a _____ backbone, operates in all five layers A) router 10. A _______ LAN allows the backbone is just one of the Internet model or B) bridge several LANs to be switch. seven layers of OSI model. C) repeater connected. A) star A) gateway D) none of the above A) wired B) bus B) router 7. A repeater is a B) wireless C) ring C) bridge connecting device that C) backbone D) none of the above D) repeater operates in the _______ D) none of the above 15. A spanning tree is a 19. A ________ is a layer of the Internet model. 11. A backbone is usually a graph in which there is no device in which the A) network ______. _____. stations are completely B) data link A) star A) arc unaware of its existence. C) physical B) bus B) loop A) simple bridge D) all of the above C) either (a) or (b) C) node B) transparent bridge 8. A _______ regenerates a D) neither (a) nor (b) D) branch C) passive hub signal, connects segments 12. A bridge can use the 16. A ________ bridge can D) repeater of a LAN, and has no _________ algorithm to forward and filter frames 20. A ______ has a table filtering capability. create a loopless topology. and automatically build its used in filtering decisions. A) router A) multiway tree forwarding table. A) bridge B) repeater B) binary tree A) dual B) passive hub C) bridge C) spanning tree B) transparent C) repeater D) none of the above D) repeater defined by the 32. A _____ can be used 21. In a star-topology 25. A _______ is a administrator. as a connecting device Ethernet LAN, _______ is connecting device that A) automatic between two just a point where the operates in the physical and B) semiautomatic internetworks that use signals coming from data link layers of the C) manual different models. different stations collide; it Internet model. D) none of the above A) gateway is the collision point. A) router B) 29. IEEE 802.1d B) router C) A) A passive hub repeater C) specification, defines bridge D) B) An active hub bridge _________ criteria for a repeater C) either (a) or (b) D) none of the above transparent bridges. 33. Membership in a VLAN D) neither (a) nor (b) 26. A _______ can check A) two can be based on 22. VLANs can_________. the MAC addresses B) four _________. A) provide an extra contained in the frame. A) C) three A) MAC addresses measure of security repeater D) none of the above B) IP addresses C) B) reduce network traffic B) bridge C) 30. A two-layer switch is a port numbers D) all C) either (a) or (b) router ______. of the above D) both (a) and (b) D) passive hub A) router 34. A ________receives a 23. A ________ link acts as 27. ________ is part of the B) repeater signal and, before it a LAN in a remote media; its location in the C) bridge becomes too weak or backbone connected by Internet model is below the D) none of the above corrupted, regenerates the remote bridges. physical layer. 31. In a bridged LAN, the original bit pattern. It then A) multidrop A) A passive hub B) An _______ algorithm creates sends the refreshed signal. B) point-to-point active hub C) either (a) a topology in which each A) router C) multipoint or (b) D) neither (a) nor LAN can be reached from B) bridge C) D) none of the above (b) any other LAN through one repeater D) 24. A __________ forwards 28. In a(n) _____ path only. passive hub every frame; it has no configuration, the stations are A) binary tree 35. In a(n) ______ filtering capability. automatically connected or B) spanning tree configuration, the A) router disconnected from a VLAN C) unary tree initializing is done B) bridge using criteria D) none of the above manually, with migrations C) passive hub done automatically. A) automatic Forouzan: MCQ in Network C) a or b C) broadcasting B) semiautomatic Layer: Delivery, Forwarding D) none of the above D) none of the above C) manual and Routing 5. RPF guarantees that 9. __________ is an D) none of the above 1. In _______ delivery, the each network receives only implementation of 36. A _______ is a three- deliverer of the IP packet and ____ of the multicast multicast distance vector layer device that handles the destination are on different packet. routing. It is a source-based packets based on their networks. A) one copy routing protocol, based on logical addresses. A) a connection-oriented B) B) two copies RIP. A) router a direct C) a or b A) MOSPF B) repeater C) an indirect D) none of the above B) DVMRP C) bridge D) none of the above 6. Routing between C) CBT D) none of the above 2. The input and output autonomous systems is D) none of the above 37. A three-layer switch is a ports of a router perform referred to as 10. In multicast routing, kind of ________. the ________ layer ____________. each involved router needs A) bridge functions of the router. A) A) interdomain routing to construct a ________ B) router physical and data link B) B) intradomain routing path tree for each group. C) repeater network C) both a and b A) average D) none of the above C) transport D) none of the above B) longest 38. Some new two-layer D) none of the above 7. DVMRP is a C) shortest switches, called _______ 3. _________ broadcasts ________routing protocol, D) none of the above 11. In switches, have been packets, but creates loops in based on RIP. ________, the multicast designed to forward the the systems. A) source-based packet must reach only frame as soon as they A) Forwarding B) B) group-shared those networks that have check the MAC addresses Flooding C) C) both a and b active members for that in the header of the frame. Backwarding D) none of the above particular group. A) come-through D) none of the above 8. In _______, the router A) RPF B) go-through 4. CBT is a ________ may forward the received B) RPB C) cut-through protocol that uses a core as packet through several of C) RPM D) none of the above the root of the tree. its interfaces. D) none of the above A) source-based B) A) unicasting 12. In ________, each node group-shared B) multicasting maintains a vector (table) of minimum distances to C) broadcasting; B) multicast D) none of the above every node. multicasting C) broadcast 24. In _______ forwarding, A) path vector D) none of the above D) none of the above 20. the full IP address of a B) distance vector 16. MOSPF is a _______ For purposes of routing, destination is given in the C) link state protocol. the Internet is divided routing table. D) none of the above 13. A A) data-driven into ___________. A) next-hop _______ message tells an B) command-driven A) wide area networks B) network-specific upstream router to start C) both a and b B) autonomous networks C) host-specific D) sending multicast D) none of the above 17. C) autonomous systems default messages for a specific RPB creates a shortest D) none of the above 25. The Routing group through a specific path _______ tree from 21. The metric used by Information Protocol (RIP) router. the source to each _______ is the hop count. is an intradomain routing A) weed destination. A) OSPF based on _________ B) graft A) unicast B) RIP routing. C) prune B) multicast C) BGP A) distance vector D) none of the above C) broadcast D) none of the above B) link state 14. RPB guarantees that D) none of the above 18. 22. A static table is one C) path vector each destination receives The _______ protocol _______. D) none of the above _________ of the packet. allows the administrator to A) with manual entries 26. ____________ is a A) one copy assign a cost, called the B) which is updated group of networks and B) no copies metric, to each route. automatically routers under the authority C) multiple copies A) OSPF C) either a or b of a single administration. A) D) none of the above B) RIP D) none of the above 23. An autonomous system B) 15. Emulation of ________ C) BGP The idea of address An area through ___________ is D) none of the above 19. A aggregation was designed C) both a and b not efficient and may one-to-all communication to alleviate the increase in D) none of the above create long delays. between one source and routing table entries when View Answer: A) unicasting; multiple all hosts on a network is using ________. 27. In the group-shared unicasting classified as a A) classful addressing tree approach, _________ B) multicasting; multiple _______ communication. B) classless addressing involved in multicasting. unicasting A) unicast C) both a and b A) only the core router is B) all routers are C) stub 34. _______ deals with A) forwarding C) only some routers are D) none of the above the issues of creating and B) backwarding D) none of the above 31. The Open Shortest Path maintaining routing tables. C) flooding 28. In OSPF, a ________ First (OSPF) protocol is an A) Forwarding D) none of the above link is a network is intradomain routing protocol B) Routing 38. A _______ routing connected to only one based on _______ C) Directing table is updated router. routing. D) none of the above periodically using one of A) point-to-point A) distance vector B) 35. To create a the dynamic routing B) transient link state neighborhood relationship, protocols. C) stub C) path vector a router running BGP sends A) static D) none of the above 29. D) none of the above an ________ message. B) dynamic _______ adds pruning and 32. In unicast routing, each A) open B) C) hierarchical grafting to _______ to router in the domain has a table update C) D) none of the above 39. create a multicast shortest that defines a ______ keep alive A one-to-many path tree that supports path tree to possible D) none of the above communication between dynamic membership destinations. 36. The Multicast Open one source and a specific changes. A) average B) Shortest Path First group of hosts is A) RPM; RPB longest C) (MOSPF) protocol is an classified as a _______ B) RPB; RPM shortest extension of the OSPF communication. C) RPF: RPM D) none of the above protocol that uses A) unicast D) none of the above 30. 33. In _______, a logical tunnel multicast routing to create B) multicast In OSPF, when the link is established by encapsulating source-based trees. The C) broadcast between two routers is the multicast packet inside a protocol is based on D) none of the above 40. A broken, the administration unicast packet. _______ routing. one-to-one communication may create a _________ A) UNIBONE B) A) distance vector between one source and link between them using a MULTBONE C) B) link state one destination is classified longer path that probably MBONE C) path vector as a goes through several D) none of the above D) none of the above _______ communication. routers. View Answer: 37. RPF eliminates the A) unicast A) point-to-point ________ in the flooding B) multicast B) transient process. C) broadcast D) none of the above 41. B) intradomain routing 48. In OSPF, a ________ C) RPM A _______ routing table C) both a and b link connects two routers D) none of the above contains information D) none of the above 45. In without any other host or 52. The task of moving the entered manually. RPF, a router forwards only the router in between. packet from the input A) static copy that has traveled the A) point-to-point queue to the output queue B) dynamic _______ B) transient in a router is done by C) hierarchical path from the source to C) stub _________. D) none of the above the router. D) none of the above A) input and output ports 42. PIM-DM is used in a A) shortest 49. In _______ forwarding, B) routing processor _______ multicast B) longest the routing table holds the C) switching fabrics environment, such as a C) average address of just the next hop D) none of the above LAN. D) none of the above 46. In instead of complete route 53. In _______ delivery, A) dense ________ routing, we assume information. both the deliverer of the IP B) sparse that there is one node (or A) next-hop packet and the destination C) a or b more) in each autonomous B) network-specific are on the same network. D) none of the above system that acts on behalf of C) host-specific D) A) a connectionless 43. In distance vector the entire autonomous default B) a direct C) routing, each node system. 50. In _______ forwarding, an indirect periodically shares its A) distant vector the destination address is a D) none of the above routing table with B) path vector network address in the 54. In _______ forwarding, _________ and whenever C) link state routing table. the mask and destination there is a change. D) none of the above 47. A) next-hop addresses are both 0.0.0.0 A) every other node ___________ is an B) network-specific in the routing table. B) its immediate neighbors interdomain routing protocol C) host-specific D) A) next-hop C) one neighbor using path vector routing. default B) network-specific D) none of the above A) BGP View Answer: C) host-specific D) 44. Routing inside an B) RIP 51. Pruning and grafting default autonomous system is C) OSPF are strategies used in 55. In the _______ tree referred to as D) none of the above _______. approach, each router _______________. A) RPF B) needs to have one shortest A) interdomain routing RPB path tree for each group. A) group-shared B) which is updated D) none of the above group through a specific B) source-based automatically View Answer: router. C) a or b C) either a or b 64. The principle of A) weed D) none of the above D) none of the above 60. In ________ states that the B) graft 56. The use of hierarchy in ______, the router forwards routing table is sorted from C) prune routing tables can the received packet through the longest mask to the D) none of the above ________ the size of only one of its interfaces. shortest mask. the routing tables. A) unicasting A) first mask matching A) reduce B) multicasting B) shortest mask matching Forouzan: MCQ in Remote B) increase C) broadcasting C) longest mask matching Logging, Electronic Mail, C) both a and b D) none of the above D) none of the above and File Transfer D) none of the above 61. In OSPF, a _______ link is a 65. PIM-SM is used in a 1. When both sender and 57. In _______ routing, the network with several routers _______multicast receiver are connected to a least cost route between attached to it. environment such as a mail server via a LAN or a any two nodes is the route A) point-to-point WAN. WAN, we need with the minimum B) transient A) dense ___________________. distance. C) stub B) sparse A) two UAs, two pairs of A) path vector D) none of the above C) a or b MTAs, and a pair of MAAs B) distance vector 62. The _________ routing D) none of the above 66. B) two UAs, and two pairs C) link state uses the Dijkstra algorithm to The routing processor of of MTAs D) none of the above build a routing table. a router performs the C) two UAs, two pairs of 58. Multicast link state A) distance vector ________ layer functions MTAs, and two pairs of routing uses the _______ B) link state of the router. MAAs tree approach. C) path vector A) physical and data link D) none of the above A) source-based D) none of the above 63. B) network 2. The actual mail transfer B) group-shared An area is _______. C) transport is done through C) a or b A) part of an AS D) none of the above 67. A ____________. D) none of the above B) composed of at least _______ message tells an A) UAs 59. A dynamic table is one two ASs upstream router to stop B) MTAs _______. C) another term for an AS sending multicast C) MAAs A) with manual entries messages for a specific D) none of the above 3. If the sender wants A) sending; receiving B) character C) retrieve a list an option enabled by B) request; reply C) line D) none of the above the receiver, it sends a C) data; control D) none of the above 11. 15. During an FTP session _______ command. D) none of the above The _______ is software the data connection is A) WILL 7. In FTP, ASCII, EBCDIC, residing on the remote opened _______. B) DO C) and image define an system that allows the A) exactly once B) WONT attribute called _______. remote system to receive exactly twice C) as D) none of the above A) file type characters from a TELNET many times as 4. When the sender is B) data structure server. necessary connected to the mail C) transmission mode A) terminal driver D) none of the above server via a LAN or a WAN, D) none of the above B) pseudoterminal driver 16. In FTP, _______ is the we need ______________. 8. The third stage in an C) TELNET client service type used by the IP A) two MTA email transfer needs a D) none of the above protocol because this is an B) two UAs and two pairs ________ protocol. 12. FTP uses the services of interactive connection of MTAs A) pull ________. between a user (human) C) two UAs and a pair of B) push A) UDP and a server. MTAs C) both a and b B) IP A) maximize throughput D) none of the above D) none of the above C) TCP B) minimize delay 5. The ________ 9. _______ is the standard D) none of the above 13. C) minimize error usually contains the mechanism provided by For the control D) none of the above sender address, the TCP/IP for copying a file connection, FTP uses the 17. When a user wants to receiver address, and from one host to another. __________ character set. access an application other information. A) TELNET A) regular ASCII program or utility located A) message B) B) SMTP B) EBCDIC on a remote machine, he envelope C) C) TFTP C) NVT ASCII or she performs both a and b D) none of the above 10. D) none of the above ___________ D) none of the above In the _______ mode, 14. In FTP, when we login. A) local 6. NVT uses two sets of each character typed is _______, it is copied from B) remote C) characters, one for sent by the client to the the client to the server. temporary _____and one for server. A) retrieve a file D) none of the above __________. A) default B) store a file 18. The third stage in an A) SMTP C) a and b C) An agent email transfer uses a(n) B) SNMP D) none of the above D) none of the above 30. ________ protocol. C) TELNET 26. TELNET is an ________ provides service A) UA D) none of the above 22. abbreviation for to the user to make the B) MTA _________ is a supplementary ____________. process of sending and C) MAA protocol that allows non-ASCII A) terminal network receiving a message easier. D) none of the above data to be sent through email. B) telephone network A) An MTA 19. TELNET uses only one A) JPEG C) telecommunication B) An MAA TCP connection. The server B) MPEG network C) A UA uses ________ port and C) MIME D) none of the above D) none of the above 31. the client uses ________ D) none of the above 23. 27. When a user logs into a The message contains port. Which of the following local time-sharing system, it the ________ and the A) a well-known; services is not provided by a is called ________ login. __________. another well-known UA? A) local A) header; envelop B) an ephemeral; another A) composing messages B) remote B) header; body ephemeral B) reading messages C) temporary C) envelop; body C) a well-known; an C) replying messages D) none of the above 28. D) none of the above 32. In ephemeral D) all are Which part of the mail the ____ mode, line editing D) none of the above 24. If the sender wants to created by the UA contains (echoing, character erasing, 20. For control, NVT uses enable an option, it sends a the sender and receiver line erasing, and so on) is US ASCII characters with _______ command. names? done by the client. the highest order bit set to A) WILL A) envelope A) default ______. B) DO B) address B) character A) 1 B) C) WONT C) header C) line 0 D) none of the above 25. D) none of the above 29. D) none of the above C) a or b In FTP, when we ________ is part of a 33. The MIME _______ D) none of the above _______, it is copied from the local hard drive, a special header uses text to 21. The formal protocol server to the client. file with permission describe the type of data in that defines the MTA client A) retrieve a file restrictions. the body of the message. and server in the Internet is B) retrieve a list A) A message A) content-type called ___________. B) A response B) content-transfer- D) none of the above special control character 45. The _______ translates encoding 38. The _______ translates called ________. local characters into NVT C) content-description NVT characters into a form A) ICA form. D) none of the above acceptable by the remote B) IAC A) terminal driver B) 34. If the sender wants to operating system. C) AIC TELNET client C) disable an option, it sends A) terminal driver B) D) none of the above TELNET server D) a _______ command. TELNET client C) 42. When the sender and none of the above A) WILL TELNET server D) the receiver of an email are 46. Currently two message B) DO C) none of the above on different systems, we access protocols are WONT 39. When the sender and need only _____________. available: _______ and D) none of the above the receiver of an email are A) one MTA _________. 35. SMTP is a on the same system, we B) two UAs A) POP3; IMAP2 __________protocol. need only ___________. A) C) two UAs and one pair B) POP4; IMAP1 A) pull one UA of MTAs C) POP3; IMAP4 B) push B) two UAs D) none of the above D) none of the above C) both a and b C) one UA and one MTA 43. During an FTP session 47. TELNET is a ________ D) none of the above D) none of the above the control connection is client-server application 36. In FTP, there are three 40. In the Internet, the opened _______. program. types of _______: stream, email address consists of A) exactly once B) A) specific-purpose block, and compressed. two parts: a _______ and a exactly twice C) as B) general-purpose A) file types _______. many times as C) both a and b B) data structures A) local part; domain necessary D) none of the above C) transmission modes name B) global part; D) none of the above 48. In FTP, a file can be D) none of the above domain name 44. If the sender wants organized into records, 37. For data, NVT uses US C) label; domain name an option disabled by the pages, or a stream of bytes. ASCII characters with the D) none of the above receiver, it sends a These are types of an highest order bit set to 41. To distinguish data _______ command. attribute called _______. A) ______. from control characters, A) WILL file types A) 1 B) each sequence of control B) DO C) B) data structures 0 characters is preceded by a DONT C) transmission modes C) a or b D) none of the above D) none of the above 49. The process of C) command-based and A) ciphertext 7. A ________ cipher transferring a mail message data-based B) plaintext replaces one character occurs in ________ phases. D) none of the above C) secret-text with another character. A) two 53. _______ is more D) none of the above A) substitution B) four powerful and complex than 4. A(n) _______ algorithm B) transposition C) C) five _______. transforms plaintext to either (a) or (b) D) D) none of the above A) POP3; IMAP4 ciphertext. neither (a) nor (b) 50. In FTP, the well-known B) IMAP4; POP3 A) encryption 8. The ________ cipher port ____ is used for the C) SMTP; POP3 B) decryption reorders the plaintext control connection and the D) none of the above C) either (a) or (b) characters to create a well-known port ________ D) neither (a) nor (b) ciphertext. for the data connection. Forouzan: MCQ in 5. The ________ method A) substitution B) A) 21; 22 Cryptography provides a one-time transposition C) B) 21; 20 1. One commonly used session key for two parties. either (a) or (b) C) 20; 21 public-key cryptography A) Diffie-Hellman D) neither (a) nor (b) D) none of the above method is the ______ B) RSA 9. _______ is a round 51. In the _______ mode, algorithm. C) DES cipher based on the the echoing is done by the A) RSS D) AES Rijndael algorithm that client. B) RAS 6. A(n) ______ is a keyless uses a 128-bit block of A) default C) RSA substitution cipher with N data. B) character D) RAA inputs and M outputs that A) AEE C) line 2. A(n) ______ algorithm uses a formula to define B) AED D) none of the above transforms ciphertext to the relationship between C) AER 52. There are two types of plaintext. the input stream and the D) AES user agents: _________ A) encryption output stream. 10. The ________is the and ___________. B) decryption A) S-box original message before A) command-driven; data- C) either (a) or (b) B) P-box transformation. driven D) neither (a) nor (b) C) T-box A) ciphertext B) command-driven; GUI- 3. The ________ is the D) none of the above B) plaintext based message after C) secret-text transformation. D) none of the above 11. A modern cipher is B) public 19. ECB and CBC are C) either (a) or (b) usually a complex C) either a or b ________ ciphers. D) neither (a) nor (b) _____cipher made of a D) neither (a) nor (b) A) block 23. DES has an initial and combination of different 15. AES has _____ different B) stream final permutation block simple ciphers. configurations. C) field and _________ rounds. A) round A) two D) none of the above A) 14 B) circle B) three 20. A(n) _______is a B) 15 C) square C) four keyless transposition C) 16 D) none of the above D) five cipher with N inputs and M D) none of the above 12. The _________ attack 16. DES is a(n) ________ outputs that uses a table to can endanger the security method adopted by the define the relationship 24. The DES function has of the Diffie-Hellman U.S. government. between the input stream _______ components. method if two parties are A) symmetric-key and the output stream. A) 2 not authenticated to each B) asymmetric-key A) S-box B) 3 other. C) either (a) or (b) B) P-box C) 4 A) man-in-the-middle D) neither (a) nor (b) C) T-box D) 5 B) ciphertext attack 17. DES uses a key D) none of the above 25. In a(n) ________ C) plaintext attack generator to generate 21. ________ DES was cipher, the same key is D) none of the above sixteen _______ round designed to increase the used by both the sender 13. A combination of an keys. size of the DES key. and receiver. encryption algorithm and a A) 32-bit A) Double A) symmetric-key decryption algorithm is B) 48-bit B) Triple B) asymmetric-key called a ________. C) 54-bit C) Quadruple C) either (a) or (b) A) cipher D) 42-bit D) none of the above D) neither (a) nor (b) B) secret 18. The Caesar cipher is a 22. ________ is the science 26. _________ ciphers can C) key _______cipher that has a and art of transforming be categorized into two D) none of the above key of 3. messages to make them broad categories: 14. In an asymmetric-key A) transposition secure and immune to monoalphabetic and cipher, the receiver uses B) additive attacks. polyalphabetic. the ______ key. C) shift A) Cryptography A) Substitution A) private D) none of the above B) Cryptoanalysis B) Transposition C) either (a) or (b) C) key B) decryption 7. A witness used in D) neither (a) nor (b) D) none of the above 31. In C) hash entity authentication is 27. The _______ cipher is a(n) ________, the key is D) none of the above ____________. the simplest called the secret key. 4. The secret key between A) something known B) monoalphabetic cipher. It A) symmetric-key members needs to be something possessed C) uses modular arithmetic B) asymmetric-key created as a ______ key something inherent D) with a modulus of 26. C) either (a) or (b) when two members all of the above A) transposition D) neither (a) nor (b) contact KDC. 8. A _______ message B) additive Forouzan: MCQ in A) public digest is used as an C) shift Network Security B) session MDC. A) keyless D) none of the above 1. Message_____ means C) complimentary D) B) keyed 28. In an asymmetric-key that the data must arrive at none of the above C) either (a) or (b) D) cipher, the sender uses the receiver exactly as 5. The ________ criterion neither (a) nor (b) the__________ key. sent. ensures that a message 9. A(n)______ creates a A) private A) confidentiality cannot easily be forged. secret key only between a B) public B) integrity A) one-wayness member and the center. C) either (a) or (b) D) C) authentication B) weak-collision- A) CA neither (a) nor (b) D) none of the above resistance B) KDC 29. In a(n) ________ 2. Message _______ means C) strong-collision- C) KDD cipher, a pair of keys is that the receiver is ensured resistance D) none of the above used. that the message is coming D) none of the above 10. ________ means to A) symmetric-key from the intended sender, 6. A(n) _____ is a trusted prove the identity of the B) asymmetric-key not an imposter. third party that assigns a entity that tries to access C) either (a) or (b) A) confidentiality symmetric key to two the system’s resources. D) neither (a) nor (b) B) integrity parties. A) Message authentication 30. The _______ is a C) authentication A) KDC B) Entity authentication C) number or a set of D) none of the above B) CA Message confidentiality D) numbers on which 3. A(n) ________function C) KDD none of the above View the cipher operates. creates a message digest D) none of the above Answer: A) cipher out of a message. 11. A ________ signature is B) secret A) encryption included in the document; a _______ signature is a B) MAC A) symmetric-key verifier by using one of the separate entity. C) either (a) or (b) B) asymmetric-key three kinds of witnesses. A) conventional; digital D) neither (a) nor (b) C) either (a) or (b) A) message authentication B) digital; digital 16. A(n) _________ can be D) neither (a) nor (b) 20. B) entity authentication C) either (a) or (b) used to preserve the A(n) ________is a federal C) message confidentiality D) neither (a) nor (b) integrity of a document or or state organization that D) message integrity a message. binds a public key to an 24. The _______ criterion 12. If _________ is needed, A) message digest B) entity and issues a states that it must be a cryptosystem must be message summary C) certificate. extremely difficult or applied over the scheme. encrypted message A) KDC impossible to create the A) integrity D) none of the above B) Kerberos message if the message B) confidentiality 17. Challenge-response C) CA digest is given. C) nonrepudiation authentication can be done D) none of the above A) one-wayness D) authentication using ________. 21. Message ________ B) weak-collision- 13. Digital signature A) symmetric-key ciphers means that the sender and resistance provides ________. B) asymmetric-key ciphers the receiver expect privacy. C) strong-collision- A) authentication B) C) keyed-hash functions A) confidentiality resistance nonrepudiation C) D) all of the above B) integrity D) none of the above both (a) and (b) D) 18. The _______criterion C) authentication 25. A(n) ______ is a neither (a) nor (b) ensures that we cannot D) none of the above hierarchical system that 14. Digital signature cannot find two messages that 22. In ________ answers queries about key provide ________ for the hash to the same digest. authentication, the certification. message. A) one-wayness claimant proves that she A) KDC A) integrity B) weak-collision- knows a secret without B) PKI B) confidentiality resistance actually sending it. C) CA C) nonrepudiation C) strong-collision- A) password-based D) none of the above D) authentication resistance B) challenge-response 26. _________ means that 15. To authenticate the D) none of the above C) either (a) or (b) a sender must not be able data origin, one needs a(n) 19. A digital signature D) neither (a) nor (b) to deny sending a message _______. needs a(n)_________ 23. In _______, a claimant that he sent. A) MDC system. proves her identity to the A) Confidentiality B) Integrity 1. _________ operates in from any application layer 9. ______ is the protocol C) Authentication the transport mode or the protocol, but the protocol designed to create security D) Nonrepudiation tunnel mode. is normally HTTP. associations, both inbound 27. A hash function A) IPSec A) SSL and outbound. must meet ________ B) SSL B) TLS A) SA criteria. A) two C) PGP C) either (a) or (b) B) CA B) three D) none of the above D) both (a) and (b) C) KDC C) four 6. IKE is a complex protocol D) IKE D) none of the above 2. IKE creates SAs for based on ______ other 10. A _______network 28. __________ is a _____. protocols. is used inside an popular session key creator A) SSL A) two organization. protocol that requires an B) PGP B) three A) private authentication server and a C) IPSec C) four B) public ticket-granting server. D) VP D) five C) semi-private A) KDC 3. ______ provides 7. IPSec defines two D) semi-public B) Kerberos either authentication or protocols: _______ and 11. SSL provides C) CA encryption, or both, for ________. _________. D) none of the above packets at the IP level. A) A) AH; SSL A) message integrity 29. Password-based AH B) PGP; ESP B) confidentiality C) authentication can be B) ESP C) AH; ESP compression divided into two broad C) PGP D) all of the above D) all of the above categories: _______ and D) SSL 8. In the ______ mode, 12. The Internet authorities _______. 4. One security protocol for IPSec protects information have reserved addresses A) fixed; variable the e-mail system is delivered from the for _______. B) time-stamped; fixed _________. transport layer to the A) intranets C) fixed; one-time A) IPSec B) network layer. B) internets D) none of the above SSL A) transport C) extranets Forouzan: MCQ in Security C) PGP B) tunnel D) none of the above in the Internet: IPSec, D) none of the above C) either (a) or (b) D) 13. An _________ is SSL/TLS, PGP, VPN, and 5. Typically, ______ can neither (a) nor (b) a network that allows Firewalls receive application data authorized access from A) intranet A) VPP D) none of the above outside users. B) internet B) VNP 26. ______ provides A) intranet C) extranet C) VNN authentication at the IP B) internet D) none of the above 18. D) VPN level. C) extranet ______ is actually an 22. _______ uses the idea A) AH D) none of the above 14. IETF version of _____. of certificate trust levels. B) ESP _________ is a collection A) TLS; TSS A) X509 C) PGP of protocols designed by B) SSL; TLS B) PGP D) SSL the IETF (Internet C) TLS; SSL C) KDC 27. In _______, the Engineering Task Force) to D) SSL; SLT D) none of the above cryptographic algorithms provide security for a 19. In ______, there is a 23. IPSec in the ______ and secrets are sent with packet at the network single path from the fully mode does not protect the the message. level. trusted authority to any IP header. A) IPSec A) IPSec certificate. A) transport B) SSL B) SSL A) X509 B) tunnel C) TLS C) PGP B) PGP C) either (a) or (b) D) D) PGP D) none of the above C) KDC neither (a) nor (b) 28. ______ is designed to 15. IKE uses _______. D) none of the above 24. ________ provides provide security and A) Oakley 20. The combination of key privacy, integrity, and compression services to B) SKEME exchange, hash, and authentication in e-mail. data generated from the C) ISAKMP encryption algorithms A) IPSec application layer. D) all of the above defines a ________ for B) SSL A) SSL 16. IPSec uses a set of each SSL session. C) PGP B) TLS SAs called the ________. A) list of protocols D) none of the above C) either (a) or (b) A) SAD B) cipher suite 25. In _____, there can be D) both (a) and (b) 29. B) SAB C) list of keys multiple paths from fully or _______ provide C) SADB D) none of the above 21. partially trusted security at the D) none of the above 17. A ______ provides privacy authorities. transport layer. An ________ is a private for LANs that must A) X509 A) SSL network that uses the communicate through the B) PGP B) TLS Internet model. global Internet. C) KDC C) either (a) or (b) D) both (a) and (b) 34. In PGP, to exchange e- 30. The _______ mode is mail messages, a user normally used when we needs a ring of _______ need host-to-host (end-to- keys. end) protection of data. A) A) secret transport B) public B) tunnel C) either (a) or (b) C) either (a) or (b) D) D) both (a) and (b) neither (a) nor (b) 31. In the _______ mode, IPSec protects the whole IP GOODLUCK SA EXAM packet, including the BABY! GALINGAN MO AH! original IP header. PANCIT BIHON IS ON THE A) transport LINE! B) tunnel I LOVE YOU BABY! C) either (a) or (b) D) neither (a) nor (b) 32. ______ was invented by Phil Zimmerman. A) IPSec B) SSL C) PGP D) none of the above 33. A _______ layer security protocol provides end-to-end security services for applications. A) data link B) network C) transport D) none of the above