Computer System Security 11th Week Solution

6
2914
Computer System Security 11th Week Solution
Computer System Security 11th Week Solution

Disclaimer for ReGyan

If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at [email protected].

 


Disclaimers for ReGyan

All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. We will not be liable for any losses and/or damages in connection with the use of our website.

Computer System Security 11th Week Solution is given below.

Q:1. In TCP, sending and receiving data is done as

1. Stream of bytes

2. Sequence of characters

3. Lines of data

4. Packets




Also See:- Nikon Scholarship 2020 Program Apply Online

Answer:- 2. Sequence of characters

Q:2. TCP groups a number of bytes together into a packet called

1. Packet

2. Buffer

3. Segment

4. Stack

Answer:- 3. Segment

Q:3. Which of these is not applicable for IP protocol?

1. Is connectionless

2. Offer reliable service

3. Offer unreliable service

4. None of the mentioned

Answer:- 2. Offer reliable service

Q:4. Which of the following is a function of IP Protocol?

1. Error reporting

2. Fragmentation and Reassembly

3. Routing

4. All of the above




Answer:- 4. All of the above

Q:5. Which of the following is not a layer of TCP protocol stack?

1. Application

2. Transport

3. Network

4. Presentation

Answer:- 4. Presentation

Q:6. _____ is a library for formatting raw packets with arbitrary IP headers.

1. Libnet

2. HeadLib

3. IPLib

4. None of the above

Answer:- 1. Libnet

Q:7. Which of the following is correct for Transmission Control Protocol?

1. Connection Oriented

2. Preserves order

3. Both A and B

4. None of the above

Answer:- 3. Both A and B




Q:8. Which of the following is a basic security problem?

1. Network packets pass by untrusted hosts

2. TCP state easily obtained by eavesdropping

3. Denial of service vulnerabilities

4. All of the above

Answer:- 4. All of the above

Q:9. Which protocol ensures reliable delivery?

1. TCP

2. UDP

3. Both A and B

4. None of the above

Answer:- 1. TCP

Q:10. Which protocol uses window flow system?

1. UDP

2. TCP

3. FTP

4. None of the above




Answer:- 2TCP

Q:11. Which of the following is not a routing protocol?

1. OSPF

2. BGP

3. ARP

4. MGP

Answer:- 4. MGP

Q:12. What is full form of ARP?

1. Address Resolution Protocol

2. Allied Resolution Protocol

3. Address Resolution Process

4. Address Rectification Protocol




Also See:- GP Birla Educational Foundation Scholarship 2020 Apply Online

Answer:- 1. Address Resolution Protocol

Q:13. ROA stands for –

1. Route Organization Administration

2. Route Organization Authorization

3. Rules of Authorization

4. Rules of Administration

Answer:- 2. Route Organization Authorization

Q:14. The Open Shortest Path First (OSPF) protocol is an intra domain routing protocol based on ________ routing.

1. Distance vector

2. Link state

3. Path vector

4. Non-distance vector




Answer:- 2. Link state

Q:15. In OSPF, a ……… link is a network with several routers attached to it.

1. Point-to-point

2. Transient

3. Stub

4. Multipoint

Answer:- 2. Transient

Computer System Security 11th Week Solution is given below. the solution of Computer System Security 11th Week Solution and all the answers are correct.

6 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here