Top 1000+ Solved Computer Networks MCQ Questions Answer
Q. A remote procedure call is _______
a. inter-process communication
b. a single process
c. a single thread
d. a single stream
Q. RPC allows a computer program to cause a subroutine to execute in _________
a. its own address space
b. another address space
c. both its own address space and another address space
d. applications address space
Q. RPC works between two processes. These processes must be ____________
a. on the same computer
b. on different computers connected with a network
c. on the same computer and also on different computers connected with a network
d. on none of the computers
Q. A remote procedure is uniquely identified by _________
a. program number
b. version number
c. procedure number
d. all of the mentioned
Q. An RPC application requires _________
a. specific protocol for client server communication
b. a client program
c. a server program
d. all of the mentioned
Q. RPC is a _________
a. synchronous operation
b. asynchronous operation
c. time independent operation
d. channel specific operation
Q. Which of the following is an advantage of anomaly detection?
a. rules are easy to define
b. custom protocols can be easily analyzed
c. the engine can scale as the rule set grows
d. malicious activity that falls within normal usage patterns is detected
Q. What is the purpose of a shadow honeypot?
a. to flag attacks against known vulnerabilities
b. to help reduce false positives in a signature-based ids
c. to randomly check suspicious traffic identified by an anomaly detection system
d. to enhance the accuracy of a traditional honeypot
Q. At which two traffic layers do most commercial IDSes generate signatures?
a. application layer and network layer
b. network layer and session layer
c. transport layer and application layer
d. transport layer and network layer
Q. When discussing IDS/IPS, what is a signature?
a. an electronic signature used to authenticate the identity of a user on the network
b. attack-definition file
c. it refers to “normal,” baseline network behavior
d. it is used to authorize the users on a network
Q. Which of the following is true of signature-based IDSes?
a. they alert administrators to deviations from “normal” traffic behavior
b. they identify previously unknown attacks
c. the technology is mature and reliable enough to use on production networks
d. they scan network traffic or packets to identify matches with attack-definition files
Q. PPP provides the _______ layer in the TCP/IP suite.
a. link
b. network
c. transport
d. application
Q. PPP consists of ________components
a. three (encapsulating, the domain name system)
b. three (encapsulating, a link control protocol, ncp)
c. two (a link control protocol, simple network control protocol)
d. one (simple network control protocol)
Q. A Link Control Protocol (LCP) is used for ____________
a. establishing, configuring and testing the data-link connection
b. establishing and configuring different network-layer protocols
c. testing the different network-layer protocols
d. provides for multiplexing of different network-layer protocols
Q. A family of network control protocols (NCPs) ____________
a. are a series of independently defined protocols that provide a dynamic
b. are a series of independently-defined protocols that encapsulate
c. are a series of independently defined protocols that provide transparent
d. the same as nfs