Top 1000+ Solved Computer Networks MCQ Questions Answer

From 241 to 255 of 952

Q. Which operating mode of telnet is full duplex?

a. default mode

b. server mode

c. line mode

d. character mode

  • c. line mode

Q. If we want that a character be interpreted by the client instead of server _________

a. interpret as command (iac) escape character has to be used

b. control functions has to be disabled

c. it is not possible

d. cli character has to be used

  • a. interpret as command (iac) escape character has to be used

Q. Telnet protocol is used to establish a connection to __________

a. tcp port number 21

b. tcp port number 22

c. tcp port number 23

d. tcp port number 25

  • c. tcp port number 23

Q. Which one of the following is not true?

a. telnet defines a network virtual terminal (nvt) standard

b. client programs interact with nvt

c. server translates nvt operations

d. client can transfer files using to remote server using nvt

  • d. client can transfer files using to remote server using nvt

Q. All telnet operations are sent as ________

a. 4 bits

b. 8 bits

c. 16 bits

d. 32 bits

  • b. 8 bits

Q. AbsoluteTelnet is a telnet client for _______ Operating system.

a. windows

b. linux

c. mac

d. ubuntu

  • a. windows

Q. Which of the following is false with respect to TCP?

a. connection-oriented

b. process-to-process

c. transport layer protocol

d. unreliable

  • d. unreliable

Q. In TCP, sending and receiving data is done as _______

a. stream of bytes

b. sequence of characters

c. lines of data

d. packets

  • a. stream of bytes

Q. TCP groups a number of bytes together into a packet called _______

a. packet

b. buffer

c. segment

d. stack

  • c. segment

Q. Communication offered by TCP is ________

a. full-duplex

b. half-duplex

c. semi-duplex

d. byte by byte

  • a. full-duplex

Q. The value of acknowledgement field in a segment defines _______

a. sequence number of the byte received previously

b. total number of bytes to receive

c. sequence number of the next byte to be received

d. sequence of zeros and ones

  • c. sequence number of the next byte to be received

Q. Size of TCP segment header ranges between ___________

a. 16 and 32 bytes

b. 16 and 32 bits

c. 20 and 60 bytes

d. 20 and 60 bits

  • c. 20 and 60 bytes

Q. Connection establishment in TCP is done by which mechanism?

a. flow control

b. three-way handshaking

c. forwarding

d. synchronization

  • b. three-way handshaking

Q. SYNC flooding attack belongs to a type of security attack known as ___________

a. sync flooding attack

b. active attack

c. passive attack

d. denial-of-service attack

  • d. denial-of-service attack
Subscribe Now

Get All Updates & News