Disclaimer for ReGyan
If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at hello@regyan.com.
Disclaimers for ReGyan
All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. We will not be liable for any losses and/or damages in connection with the use of our website.
Computer System Security 11th Week Solution is given below.
Q:1. In TCP, sending and receiving data is done as
1. Stream of bytes
2. Sequence of characters
3. Lines of data
4. Packets
Also See:- Nikon Scholarship 2020 Program Apply Online
Answer:- 2. Sequence of characters
Q:2. TCP groups a number of bytes together into a packet called
1. Packet
2. Buffer
3. Segment
4. Stack
Answer:- 3. Segment
Q:3. Which of these is not applicable for IP protocol?
1. Is connectionless
2. Offer reliable service
3. Offer unreliable service
4. None of the mentioned
Answer:- 2. Offer reliable service
Q:4. Which of the following is a function of IP Protocol?
1. Error reporting
2. Fragmentation and Reassembly
3. Routing
4. All of the above
Answer:- 4. All of the above
Q:5. Which of the following is not a layer of TCP protocol stack?
1. Application
2. Transport
3. Network
4. Presentation
Answer:- 4. Presentation
Q:6. _____ is a library for formatting raw packets with arbitrary IP headers.
1. Libnet
2. HeadLib
3. IPLib
4. None of the above
Answer:- 1. Libnet
Q:7. Which of the following is correct for Transmission Control Protocol?
1. Connection Oriented
2. Preserves order
3. Both A and B
4. None of the above
Answer:- 3. Both A and B
Q:8. Which of the following is a basic security problem?
1. Network packets pass by untrusted hosts
2. TCP state easily obtained by eavesdropping
3. Denial of service vulnerabilities
4. All of the above
Answer:- 4. All of the above
Q:9. Which protocol ensures reliable delivery?
1. TCP
2. UDP
3. Both A and B
4. None of the above
Answer:- 1. TCP
Q:10. Which protocol uses window flow system?
1. UDP
2. TCP
3. FTP
4. None of the above
Answer:- 2. TCP
Q:11. Which of the following is not a routing protocol?
1. OSPF
2. BGP
3. ARP
4. MGP
Answer:- 4. MGP
Q:12. What is full form of ARP?
1. Address Resolution Protocol
2. Allied Resolution Protocol
3. Address Resolution Process
4. Address Rectification Protocol
Also See:- GP Birla Educational Foundation Scholarship 2020 Apply Online
Answer:- 1. Address Resolution Protocol
Q:13. ROA stands for –
1. Route Organization Administration
2. Route Organization Authorization
3. Rules of Authorization
4. Rules of Administration
Answer:- 2. Route Organization Authorization
Q:14. The Open Shortest Path First (OSPF) protocol is an intra domain routing protocol based on ________ routing.
1. Distance vector
2. Link state
3. Path vector
4. Non-distance vector
Answer:- 2. Link state
Q:15. In OSPF, a ……… link is a network with several routers attached to it.
1. Point-to-point
2. Transient
3. Stub
4. Multipoint
Answer:- 2. Transient
Computer System Security 11th Week Solution is given below. the solution of Computer System Security 11th Week Solution and all the answers are correct.
Thanks….just got the solution of week 11 CSS
10 week ka toh quiz hi hai
Thank You So Much..
Good content for all students
If a quiz got missed then we can give it again
https://regyan.com/computer-system-security-special-quiz-solution/