Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer

From 76 to 90 of 268

Q. 6 INTRODUCTION TO PEER TO PEER NETWORKS

a. client/server

b. source/destination

c. message transfer

d. peer to peer

  • a. client/server

Q. Multiple processes on destinations at transport layer are identified by                      

a. mac address

b. port number

c. host number

d. host address

  • b. port number

Q. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?

a. well-known ports

b. registered ports

c. dynamic ports

d. static ports

  • d. static ports

Q. The combination of an IP address and port number is called as                  

a. socket address

b. port address

c. mac address

d. host address

  • a. socket address

Q. Which of the following is false with respect to Connectionless service of transport layer protocol?

a. packets are not numbered

b. packets are not delayed

c. no acknowledgement

d. packet may arrive out of sequence

  • b. packets are not delayed

Q. In transport layer, Multiplexing is done at

a. channel

b. receiver site

c. sender site

d. packet

  • c. sender site

Q. Number of phases in the handshaking protocol?

a. 2

b. 3

c. 4

d. 5

Q. In the SSL record protocol operation pad_2 is –

a. is the byte 0x36 repeated 40 times for md5

b. is the byte 0x5c repeated 48 times for md5

c. is the byte 0x5c repeated 48 times for sha-1

d. is the byte 0x36 repeated 48 times for md5

  • b. is the byte 0x5c repeated 48 times for md5

Q. In the SSL record protocol operation pad_1 is –

a. is the byte 0x36 repeated 40 times for md5

b. is the byte 0x5c repeated 40 times for md5

c. is the byte 0x5c repeated 48 times for sha-1

d. is the byte 0x36 repeated 48 times for md5

  • d. is the byte 0x36 repeated 48 times for md5

Q. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

a. server_done

b. server_key_exchange

c. certificate_request

d. crtificate_verify

  • a. server_done

Q. Which is the key exchange algorithm used in CipherSuite parameter?

a. rsa

b. fixed diffie-hellman

c. ephemeral diffie-hellman

d. any of the mentioned

  • d. any of the mentioned

Q. The certificate message is required for any agreed-on key exchange method except

a. ephemeral diffie-hellman

b. anonymous diffie-hellman

c. fixed diffie-hellman

d. rsa

  • b. anonymous diffie-hellman

Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

a. fortezza

b. anonymous diffie-hellman

c. fixed diffie-hellman

d. rsa

  • c. fixed diffie-hellman

Q. The DSS signature uses which hash algorithm?

a. md5

b. sha-2

c. sha-1

d. does not use hash algorithm

  • c. sha-1
Subscribe Now

Get All Updates & News