ST Marys Group of Institutions Guntur: A. B. C. D

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

ST MARYS GROUP OF INSTITUTIONS GUNTUR

COURSE / SEM: III B.TECH/ IISEM EXAM: QUIZ – I DATE: 06-08-21


SUBJECT: CYBER SECURITY BRANCH: CSE DURATION:20 MIN

MARKS: 20 M
___________________________________________________________________________

1.How long is an IPv6 address?

A.32 bits
B.128 bytes
C.64 bits
D.128 bits

2 Which protocol is used to send a destination network unknown message back to originating
hosts?

A
TCP B.ARP
.
C.ICMP D.BootP

3 Which class of IP address has the most host addresses available by default?

A
A B. B C C D A and B
.
4 Which protocol does Ping use?
A
TCP B.ARP
.
C.ICMP D.BootP

5 Which class of IP address provides a maximum of only 254 host addresses per network ID?

A
Class A B Class B C Class C D Class D
.

6 If you use either Telnet or FTP, which is the highest layer you are using to transmit data?

A.
Application
B.
Presentation
C.
Session
D.
Transport

7 What protocol is used to find the hardware address of a local device?


A.
RARP
B.
ARP

C.
IP
D.
ICMP

8 A computer circuit board installed in a computer so that it can be connected to a network?

1)
NIC
2)
Switch
3)
RJ45
4)
Hub

9 A NIC card can be used for?

1) FDDI 2) Ethernet 3) Microwave 4) WiFi

10 Which protocol is used to send email?  


1) SMTP 2) POP 3) HTTP 4) FTP
11 DNS is the abbreviation of

A.  Dynamic Name System


B.  Dynamic Network System
C.  Domain Name System
D.  Domain Network Service

12 DHCP is the abbreviation of

A.  Dynamic Host Control Protocol


B.  Dynamic Host Configuration Protocol
C.  Dynamic Hyper Control Protocol
D.  Dynamic Hyper Configuration Protocol

13 Which is not a application layer protocol?


a) HTTP b) SMTP c) FTP d) TCP

14 The packet of information at the application layer is called __________


a) Packet b) Message c) Segment d) Frame

15 Application layer offers _______ service.


a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned

16 E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned

17 The entire hostname has a maximum of ___________


a) 255 characters b) 127 characters c) 63 characters d) 31 characters

18 Which of the following is false with respect to UDP?


a) Connection-oriented b) Unreliable c) Transport layer protocol d) Low overhead

19 What is the main advantage of UDP?


a) More overload b) Reliable c) Low overhead d) Fast

20 What is the header size of a UDP packet?


a) 8 bytes b) 8 bits c) 16 bytes d) 124 bytes

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy