Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer
Q. 6 INTRODUCTION TO PEER TO PEER NETWORKS
a. client/server
b. source/destination
c. message transfer
d. peer to peer
Q. Multiple processes on destinations at transport layer are identified by
a. mac address
b. port number
c. host number
d. host address
Q. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?
a. well-known ports
b. registered ports
c. dynamic ports
d. static ports
Q. The combination of an IP address and port number is called as
a. socket address
b. port address
c. mac address
d. host address
Q. Which of the following is false with respect to Connectionless service of transport layer protocol?
a. packets are not numbered
b. packets are not delayed
c. no acknowledgement
d. packet may arrive out of sequence
Q. The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as
a. delivery of packets
b. error correction
c. multiplexing
d. demultiplexing
Q. In the SSL record protocol operation pad_2 is –
a. is the byte 0x36 repeated 40 times for md5
b. is the byte 0x5c repeated 48 times for md5
c. is the byte 0x5c repeated 48 times for sha-1
d. is the byte 0x36 repeated 48 times for md5
Q. In the SSL record protocol operation pad_1 is –
a. is the byte 0x36 repeated 40 times for md5
b. is the byte 0x5c repeated 40 times for md5
c. is the byte 0x5c repeated 48 times for sha-1
d. is the byte 0x36 repeated 48 times for md5
Q. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
a. server_done
b. server_key_exchange
c. certificate_request
d. crtificate_verify
Q. Which is the key exchange algorithm used in CipherSuite parameter?
a. rsa
b. fixed diffie-hellman
c. ephemeral diffie-hellman
d. any of the mentioned
Q. The certificate message is required for any agreed-on key exchange method except
a. ephemeral diffie-hellman
b. anonymous diffie-hellman
c. fixed diffie-hellman
d. rsa
Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
a. fortezza
b. anonymous diffie-hellman
c. fixed diffie-hellman
d. rsa
Q. The DSS signature uses which hash algorithm?
a. md5
b. sha-2
c. sha-1
d. does not use hash algorithm