Security And Application Layer (Advance Level) - 1


15 Questions MCQ Test Question Bank for GATE Computer Science Engineering | Security And Application Layer (Advance Level) - 1


Description
This mock test of Security And Application Layer (Advance Level) - 1 for Computer Science Engineering (CSE) helps you for every Computer Science Engineering (CSE) entrance exam. This contains 15 Multiple Choice Questions for Computer Science Engineering (CSE) Security And Application Layer (Advance Level) - 1 (mcq) to study with solutions a complete question bank. The solved questions answers in this Security And Application Layer (Advance Level) - 1 quiz give you a good mix of easy questions and tough questions. Computer Science Engineering (CSE) students definitely take this Security And Application Layer (Advance Level) - 1 exercise for a better result in the exam. You can find other Security And Application Layer (Advance Level) - 1 extra questions, long questions & short questions for Computer Science Engineering (CSE) on EduRev as well by searching above.
QUESTION: 1

A high speed communication equipment typically would not be needed for

Solution:

E-mail is a method of exchanging digital messages between people using digital devices. Size of E-mail is typically from 1 KB to 20 MB. So it does not require high speed communication equipment.

QUESTION: 2

You need to determine whether the configuration is initialized or if a duplicate IP address is configured on your NT workstation. Which utility should you use?

Solution:

ipcon fig.exe: ipconfig.exe command line tool used to display the current transmission control protocol/internet protocol configuration, with use of this command we can determine weather configuration is initialized or duplicate IP address is configured on our system, ping .exe: computer network software utility used to test the reachability of host on a IP network, arp.exe: is a address resolution protocol which need to find ethernet address (MAC) for corresponding IP address.

QUESTION: 3

The store and forward mechanism is used in

Solution:

In message switching mechanism, a node (usually a special computer with a number of disks)- receives a message, stores it until the appropriate route is free, then sends it along that route.

QUESTION: 4

Which of the following protocols is used to monitor network devices such as hubs, switches, and routes?

Solution:

S im ple netw ork management protocol is a protocol for network management and is used for collecting information from and configuration, network devices, such as servers, printers, hubs, switches and routers on an IP network.

QUESTION: 5

Which protocol is used to convert IP addresses to MAC address?

Solution:

ARP is address resolution protocol used to find MAC address for corresponding IP address.

QUESTION: 6

Symmetric encryption algorithm is same as

Solution:

The secret key encryption algorithm are often referred to as symmetric encryption algorithms because the same secret key can be used in bidirectional communication sender and receiver.

QUESTION: 7

Public key encryption makes use of

Solution:

In public key encryption/decryption, there are two keys: a private key and a public key. The private key is kept by receiver. The public key is announced to the public.

QUESTION: 8

Which of the following layer oversees both error control and flow control at the source to destination level?

Solution:

Transport layer protocol taken care of both error control and flow control at source to destination level.

QUESTION: 9

Which layer deals with
(i) File system transfer
(ii) Virtual terminals implementation
(iii) Inter process communication

Solution:

Application layer deals with file system transfer, virtual terminals implementation and inter process communication.

QUESTION: 10

Which of the following error detection method consists of just one redundant bit per data unit?

Solution:

Vertical redundancy check (VRC), often called a parity check. In this, a redundant bit, called parity bit, is appended to every data unit so that total number of 1 ’s in unit becomes even (including the parity bit).

QUESTION: 11

Which of the following is NOT true with respect to a transparent bridge and a router?

Solution:

Bridge operates at physical layer and router operates at network layer

QUESTION: 12

Which of the following is incorrect statement?

Solution:

Machine connected to the internet may use the ARP when it want to use the data link layer.

QUESTION: 13

Which statement is false?

Solution:

PING is a command which is used to check the particular port is working or not by sending echo frame and receiving echo response in specified time.

QUESTION: 14

Which one of the following uses UDP as the transport protocol?

Solution:

Domain Name System (DNS) maps a name onto an IP address, an application program calls a library procedure called the resolver, passing name as a parameter. The resolver sends a UDP packet to a load DNS server, which then looks up the name and returns the IP address to the resolver, which then returns it to caller.
So DNS uses transport layer protocol UDP

QUESTION: 15

Consider the following clauses:
(i) Not inherently suitable for client authentication.
(ii) Not a state sensitive protocol.
(iii) Must be operated with more than one server.
(iv) Suitable for structured message organization.
(v) May need two ports on the serve side for proper operation.

The option that has the maximum number of correct matches is

Solution:

IMAP : It distributes mail boxes across multiple servers
FTP: Requires two ports: 20 and 21 for FTP-data and FTP-control respectively.
HTTP: HTTP is a stateless protocol. Hence not a state sensitive protocol.
DNS: This protocol maintains it’s database is a structured and hierarchia! manner.
SMTP: Intersect standard for e-mail transmission and not suitable for client server communication.

Related tests