1) Which of the following point(s) is/are true for an ethical hacker ?

a. An ethical hacker intends to gain unauthorized access to a resource for financial gain or personal recognition.

b. An ethical hacker defaces websites or crash backend servers for fun, reputation damage or to cause financial loss ?

c. An ethical hacker is not concerned with improving the organization’s security posture.

d. None of these.

Answer: d

 

2) Which of the following statement(s) is/are true ?

a. In the black box model, the tester has complete information about the network.

b. In the white box model, the tester does not have any information about the network.

c. In the gray box model, the tester has partial information about the network.

d. None of these.

Answer: c

 

3) Which of the following statement(s) is/are false for a packet switched network ?

a. A communication link can be shared by more than one connection.

b. A communication link is dedicated to a connection and cannot be shared with other connections.

c. It is efficient for bursty traffic.

d. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.

Answer:

 

4) Which of the following statement(s) is/are true for datagram-baseed packet transfer approach ?

a. It is a connection-less packet switching approach, where no route is established prior to transfer of packets.

b. In this approach, each packet is transmitted as an independent entity.

c. In this approach each intermediate node can perform dynamic routing.

d. In this approach all the packets reach in order to the destination.

Answer:

5) What is the purpose of the port number in TCP/IP networks ?

a. It uniquely identifies a network interface of a computer system.

b. It uniquely identifies a host in the network.

c. It uniquely identifies a running application on a specific host in the network.

d. It indicates how many hardware ports are there in the computer system.

e. None of these.

Answer:

 

6) Which of the following is not a valid port numbers in TCP/IP ?

a. 21

b. 80

c. 443

d. 8080

e. 80800

Answer:  e   (As there are only  65535 ports available )

 

7) Which of the following functionality does Address Resolution Protocol (ARP) perform ?

a. Map IP address to hardware (MAC) addresses.

b. Map hardware addresses (MAC) to IP addresses.

c. Performs error control and correction.

d. Breaks the packet into smaller packets, if required.

Answer:

 

8) Which of the following statement(s) is/are false ?

a. IP provides connectionless, unreliable delivery systems for packets.

b. UCP provides connectionless, unreliable delivery systems for packets.

c. TCP provides connectionless, unreliable delivery systems for packets.

d. None of these

Answer: b

 

9) If the IP header is 96 bits long, what will be the value (in decimal) of the “HLEN” field  _____ ?

Answer:

 

10) The maximum size of data that can be accommodated in an IP datagram is _______ bytes.

Answer:

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2022 itfreesource.com