Monday, 3 April 2017


Q1. These are the features present in IPv4 but not in IPv6.
(a) Fragmentation
(b) Header checksum
(c) Options
(d) All of the mentioned
(e) None of the above

Q2. The size of IP address in IPv6 is
(a) 4bytes
(b) 128bits
(c) 8bytes
(d) 100bits
(e) 64 bits

Q3. IPv6 does not use ______ type of address
(a) Broadcast
(b) Multicast
(c) Anycast
(d) None of the mentioned
(e) singlecast

Q4. Which of the following is related to ipconfig in Microsoft Windows ?
(a) Display all current TCP/IP network configuration values
(b) Modify DHCP settings
(c) Modify DNS settings
(d) All of the mentioned
(e) None of the above

Q5. Which of the following is not correct?
(a) Web cache doesn’t has its own disk space
(b) Web cache can act both like server and client
(c) Web cache might reduce the response time
(d) Web cache contains copies of recently requested objects.
(e) All are correct

Q6. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
(a) TCP
(b) UDP
(c) DCCP
(d) SCTP
(e) All of the above

Q7. Which one of the following protocol is used to receive mail messages?
(a) SMTP
(b) post office protocol
(c) internet message access protocol
(d) ARP
(e) all of the mentioned

Q8. A ______is an interconnected network of computers infected with malware without the user's knowledge and controlled by cybercriminals. They're typically used to send spam emails, transmit viruses and engage in other acts of cybercrime.
(a) internet
(b) Botnet
(c) Dotnet
(d) D-Net
(e) None of the above

Q9. Which of the following is a form of DoS attack ?
(a) Vulnerability attack
(b) Bandwidth flooding
(c) Connection flooding
(d) All of the mentioned
(e) None of the above

Q10. Firewalls are often configured to block
(a) UDP traffic
(b) TCP traffic
(c) Both (a) and (b)
(d) None of the mentioned
(e) Email access

Q11. Sniffers can be deployed in
(a) Wired environment
(b) Wireless Fidelity
(c) Ethernet LAN
(d) All of the mentioned
(e) None of the above

Q12. WPA2 is used for security in
(a) ethernet
(b) bluetooth9
(c) wireless fidelity(wi-fi)
(d) none of the mentioned
(e) can be used in all of the above

Q13. Voice privacy in GSM cellular telephone protocol is provided by
(a) A5/2 cipher
(b) b5/4 cipher
(c) b5/6 cipher
(d) b5/8 cipher
(e) None of the above

Q14. An attempt to make a computer resource unavailable to its intended users is called
(a) denial-of-service attack
(b) virus attack
(c) worms attack
(d) botnet process
(e) spam attack

Q15. Common gateway interface is used to
(a) generate executable files from web content by web server
(b) generate web pages
(c) stream videos
(d) none of the mentioned
(e) All of the above