Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Tests  >  Test: Security & Application Layer- 2 - Computer Science Engineering (CSE) MCQ

Test: Security & Application Layer- 2 - Computer Science Engineering (CSE) MCQ


Test Description

15 Questions MCQ Test - Test: Security & Application Layer- 2

Test: Security & Application Layer- 2 for Computer Science Engineering (CSE) 2024 is part of Computer Science Engineering (CSE) preparation. The Test: Security & Application Layer- 2 questions and answers have been prepared according to the Computer Science Engineering (CSE) exam syllabus.The Test: Security & Application Layer- 2 MCQs are made for Computer Science Engineering (CSE) 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Security & Application Layer- 2 below.
Solutions of Test: Security & Application Layer- 2 questions in English are available as part of our course for Computer Science Engineering (CSE) & Test: Security & Application Layer- 2 solutions in Hindi for Computer Science Engineering (CSE) course. Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free. Attempt Test: Security & Application Layer- 2 | 15 questions in 45 minutes | Mock test for Computer Science Engineering (CSE) preparation | Free important questions MCQ to study for Computer Science Engineering (CSE) Exam | Download free PDF with solutions
Test: Security & Application Layer- 2 - Question 1

A high speed communication equipment typically would not be needed for

Detailed Solution for Test: Security & Application Layer- 2 - Question 1

E-mail is a method of exchanging digital messages between people using digital devices. Size of E-mail is typically from 1 KB to 20 MB. So it does not require high speed communication equipment.

Test: Security & Application Layer- 2 - Question 2

You need to determine whether the configuration is initialized or if a duplicate IP address is configured on your NT workstation. Which utility should you use?

Detailed Solution for Test: Security & Application Layer- 2 - Question 2

ipcon fig.exe: ipconfig.exe command line tool used to display the current transmission control protocol/internet protocol configuration, with use of this command we can determine weather configuration is initialized or duplicate IP address is configured on our system, ping .exe: computer network software utility used to test the reachability of host on a IP network, arp.exe: is a address resolution protocol which need to find ethernet address (MAC) for corresponding IP address.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Test: Security & Application Layer- 2 - Question 3

The store and forward mechanism is used in

Detailed Solution for Test: Security & Application Layer- 2 - Question 3

In message switching mechanism, a node (usually a special computer with a number of disks)- receives a message, stores it until the appropriate route is free, then sends it along that route.

Test: Security & Application Layer- 2 - Question 4

Which of the following protocols is used to monitor network devices such as hubs, switches, and routes?

Detailed Solution for Test: Security & Application Layer- 2 - Question 4

S im ple netw ork management protocol is a protocol for network management and is used for collecting information from and configuration, network devices, such as servers, printers, hubs, switches and routers on an IP network.

Test: Security & Application Layer- 2 - Question 5

Which protocol is used to convert IP addresses to MAC address?

Detailed Solution for Test: Security & Application Layer- 2 - Question 5

ARP is address resolution protocol used to find MAC address for corresponding IP address.

Test: Security & Application Layer- 2 - Question 6

Symmetric encryption algorithm is same as

Detailed Solution for Test: Security & Application Layer- 2 - Question 6

The secret key encryption algorithm are often referred to as symmetric encryption algorithms because the same secret key can be used in bidirectional communication sender and receiver.

Test: Security & Application Layer- 2 - Question 7

Public key encryption makes use of

Detailed Solution for Test: Security & Application Layer- 2 - Question 7

In public key encryption/decryption, there are two keys: a private key and a public key. The private key is kept by receiver. The public key is announced to the public.

Test: Security & Application Layer- 2 - Question 8

Which of the following layer oversees both error control and flow control at the source to destination level?

Detailed Solution for Test: Security & Application Layer- 2 - Question 8

Transport layer protocol taken care of both error control and flow control at source to destination level.

Test: Security & Application Layer- 2 - Question 9

Which layer deals with
(i) File system transfer
(ii) Virtual terminals implementation
(iii) Inter process communication

Detailed Solution for Test: Security & Application Layer- 2 - Question 9

Application layer deals with file system transfer, virtual terminals implementation and inter process communication.

Test: Security & Application Layer- 2 - Question 10

Which of the following error detection method consists of just one redundant bit per data unit?

Detailed Solution for Test: Security & Application Layer- 2 - Question 10

Vertical redundancy check (VRC), often called a parity check. In this, a redundant bit, called parity bit, is appended to every data unit so that total number of 1 ’s in unit becomes even (including the parity bit).

Test: Security & Application Layer- 2 - Question 11

Which of the following is NOT true with respect to a transparent bridge and a router?

Detailed Solution for Test: Security & Application Layer- 2 - Question 11

Bridge operates at physical layer and router operates at network layer

Test: Security & Application Layer- 2 - Question 12

Which of the following is incorrect statement?

Detailed Solution for Test: Security & Application Layer- 2 - Question 12

Machine connected to the internet may use the ARP when it want to use the data link layer.

Test: Security & Application Layer- 2 - Question 13

Which statement is false?

Detailed Solution for Test: Security & Application Layer- 2 - Question 13

PING is a command which is used to check the particular port is working or not by sending echo frame and receiving echo response in specified time.

Test: Security & Application Layer- 2 - Question 14

Which one of the following uses UDP as the transport protocol?

Detailed Solution for Test: Security & Application Layer- 2 - Question 14

Domain Name System (DNS) maps a name onto an IP address, an application program calls a library procedure called the resolver, passing name as a parameter. The resolver sends a UDP packet to a load DNS server, which then looks up the name and returns the IP address to the resolver, which then returns it to caller.
So DNS uses transport layer protocol UDP

Test: Security & Application Layer- 2 - Question 15

Consider the following clauses:
(i) Not inherently suitable for client authentication.
(ii) Not a state sensitive protocol.
(iii) Must be operated with more than one server.
(iv) Suitable for structured message organization.
(v) May need two ports on the serve side for proper operation.

The option that has the maximum number of correct matches is

Detailed Solution for Test: Security & Application Layer- 2 - Question 15

IMAP : It distributes mail boxes across multiple servers
FTP: Requires two ports: 20 and 21 for FTP-data and FTP-control respectively.
HTTP: HTTP is a stateless protocol. Hence not a state sensitive protocol.
DNS: This protocol maintains it’s database is a structured and hierarchia! manner.
SMTP: Intersect standard for e-mail transmission and not suitable for client server communication.

Information about Test: Security & Application Layer- 2 Page
In this test you can find the Exam questions for Test: Security & Application Layer- 2 solved & explained in the simplest way possible. Besides giving Questions and answers for Test: Security & Application Layer- 2, EduRev gives you an ample number of Online tests for practice

Top Courses for Computer Science Engineering (CSE)

Download as PDF

Top Courses for Computer Science Engineering (CSE)