InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following organizations is primarily concerned with military encryption systems?(a) NSA(b) NIST(c) IEEE(d) ITUThis question was posed to me in unit test.The above asked question is from AH and ESP Protocols topic in portion Transport Layer of Computer Network |
|
Answer» Right OPTION is (a) NSA |
|
| 2. |
In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.(a) confidentiality(b) integrity(c) availability(d) authenticityI got this question in exam.This key question is from AH and ESP Protocols in portion Transport Layer of Computer Network |
|
Answer» Right choice is (a) CONFIDENTIALITY |
|
| 3. |
In computer security _______ means that computer system assets can be modified only by authorized parities.(a) confidentiality(b) integrity(c) availability(d) authenticityThis question was addressed to me by my school teacher while I was bunking the class.Origin of the question is AH and ESP Protocols topic in portion Transport Layer of Computer Network |
|
Answer» The correct choice is (b) integrity |
|
| 4. |
ESP does not provide ________(a) source authentication(b) data integrity(c) privacy(d) error controlThis question was addressed to me during an online interview.This interesting question is from AH and ESP Protocols topic in chapter Transport Layer of Computer Network |
|
Answer» Right option is (d) error control |
|
| 5. |
IP Security operates in which layer of the OSI model?(a) Network(b) Transport(c) Application(d) PhysicalThe question was asked during an interview.My question is based upon AH and ESP Protocols topic in division Transport Layer of Computer Network |
|
Answer» Right CHOICE is (a) Network |
|
| 6. |
IPsec defines two protocols: _______ and ________(a) AH; SSL(b) PGP; ESP(c) AH; ESP(d) PGP; SSLThe question was posed to me in an online interview.My doubt is from AH and ESP Protocols topic in division Transport Layer of Computer Network |
|
Answer» The CORRECT choice is (c) AH; ESP |
|
| 7. |
______ provides authentication at the IP level.(a) AH(b) ESP(c) PGP(d) SSLThe question was posed to me in an interview.Enquiry is from AH and ESP Protocols topic in portion Transport Layer of Computer Network |
|
Answer» Right option is (a) AH |
|
| 8. |
Which two types of IPsec can be used to secure communications between two LANs?(a) AH tunnel mode(b) ESP tunnel mode(c) Both AH tunnel mode and ESP tunnel mode(d) ESP transport modeI got this question by my college professor while I was bunking the class.This intriguing question originated from AH and ESP Protocols in section Transport Layer of Computer Network |
|
Answer» RIGHT choice is (c) Both AH tunnel mode and ESP tunnel mode The explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire original IP packet unlike transport mode which is not as SECURE as it only encrypts the data portion and not the whole packet. |
|
| 9. |
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?(a) Kerberos V5(b) SHA(c) MD5(d) Both SHA and MD5This question was addressed to me in homework.My question is based upon AH and ESP Protocols topic in section Transport Layer of Computer Network |
|
Answer» Correct OPTION is (d) Both SHA and MD5 |
|
| 10. |
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?(a) AH transport mode(b) ESP transport mode(c) ESP tunnel mode(d) AH tunnel modeThe question was posed to me in semester exam.My query is from AH and ESP Protocols in chapter Transport Layer of Computer Network |
|
Answer» The correct option is (b) ESP TRANSPORT mode |
|
| 11. |
The ______ field is used to detect errors over the entire user datagram.(a) udp header(b) checksum(c) source port(d) destination portI got this question at a job interview.This interesting question is from UDP topic in chapter Transport Layer of Computer Network |
|
Answer» The correct choice is (b) checksum |
|
| 12. |
Which is the correct expression for the length of UDP datagram?(a) UDP length = IP length – IP header’s length(b) UDP length = UDP length – UDP header’s length(c) UDP length = IP length + IP header’s length(d) UDP length = UDP length + UDP header’s lengthI have been asked this question in my homework.I want to ask this question from UDP topic in portion Transport Layer of Computer Network |
|
Answer» Correct option is (a) UDP length = IP length – IP header’s length |
|
| 13. |
“Total length” field in UDP packet header is the length of _________(a) Only UDP header(b) Only data(c) Only checksum(d) UDP header plus dataI had been asked this question during an online interview.This interesting question is from UDP topic in section Transport Layer of Computer Network |
|
Answer» Right option is (d) UDP header PLUS data |
|
| 14. |
The port number is “ephemeral port number”, if the source host is _______(a) NTP(b) Echo(c) Server(d) ClientThe question was posed to me in unit test.This intriguing question originated from UDP in chapter Transport Layer of Computer Network |
|
Answer» Correct OPTION is (d) Client |
|
| 15. |
What is the header size of a UDP packet?(a) 8 bytes(b) 8 bits(c) 16 bytes(d) 124 bytesI had been asked this question in semester exam.Origin of the question is UDP topic in chapter Transport Layer of Computer Network |
|
Answer» The correct answer is (a) 8 BYTES |
|
| 16. |
Port number used by Network Time Protocol (NTP) with UDP is ________(a) 161(b) 123(c) 162(d) 124I got this question in quiz.Origin of the question is UDP in portion Transport Layer of Computer Network |
|
Answer» The correct answer is (b) 123 |
|
| 17. |
What is the main advantage of UDP?(a) More overload(b) Reliable(c) Low overhead(d) FastI got this question by my college director while I was bunking the class.My query is from UDP topic in division Transport Layer of Computer Network |
|
Answer» Correct answer is (c) LOW OVERHEAD |
|
| 18. |
Beyond IP, UDP provides additional services such as _______(a) Routing and switching(b) Sending and receiving of packets(c) Multiplexing and demultiplexing(d) Demultiplexing and error checkingI got this question during a job interview.Origin of the question is UDP in portion Transport Layer of Computer Network |
|
Answer» Correct choice is (d) Demultiplexing and error checking |
|
| 19. |
Return value of the UDP port “Chargen” is _______(a) String of characters(b) String of integers(c) Array of characters with integers(d) Array of zero’s and one’sI had been asked this question in a job interview.My question comes from UDP topic in division Transport Layer of Computer Network |
|
Answer» RIGHT choice is (a) STRING of CHARACTERS The BEST I can explain: Using Chargen with UDP on port 19, the server sends a UDP datagram containing a random number of characters every time it receives a datagram from the connecting host. The number of characters is between 0 and 512. |
|
| 20. |
Which of the following is false with respect to UDP?(a) Connection-oriented(b) Unreliable(c) Transport layer protocol(d) Low overheadThe question was asked in quiz.This interesting question is from UDP topic in section Transport Layer of Computer Network |
|
Answer» Right answer is (a) Connection-oriented |
|
| 21. |
What allows TCP to detect lost segments and in turn recover from that loss?(a) Sequence number(b) Acknowledgment number(c) Checksum(d) Both Sequence & Acknowledgment numberThis question was posed to me in an online quiz.Question is taken from TCP-2 topic in division Transport Layer of Computer Network |
|
Answer» Right option is (b) Acknowledgment NUMBER |
|
| 22. |
The sizes of source and destination port address in TCP header are ___________ respectively.(a) 16-bits and 32-bits(b) 16-bits and 16-bits(c) 32-bits and 16-bits(d) 32-bits and 32-bitsThis question was addressed to me in an online interview.My question is from TCP-2 in portion Transport Layer of Computer Network |
|
Answer» The CORRECT choice is (B) 16-bits and 16-bits |
|
| 23. |
SYNC flooding attack belongs to a type of security attack known as ___________(a) SYNC flooding attack(b) Active attack(c) Passive attack(d) Denial-of-service attackI got this question in exam.My doubt stems from TCP-2 topic in chapter Transport Layer of Computer Network |
|
Answer» The correct choice is (d) Denial-of-SERVICE attack |
|
| 24. |
A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?(a) SYNC flooding attack(b) Active attack(c) Passive attack(d) Denial-of-service attackI had been asked this question by my school principal while I was bunking the class.This interesting question is from TCP-2 topic in chapter Transport Layer of Computer Network |
|
Answer» Right choice is (a) SYNC flooding attack |
|
| 25. |
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ___________(a) Mutual open(b) Mutual Close(c) Simultaneous open(d) Simultaneous closeI had been asked this question in an interview.My doubt is from TCP-2 topic in chapter Transport Layer of Computer Network |
|
Answer» Correct choice is (c) Simultaneous open |
|
| 26. |
A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ___________(a) Active open(b) Active close(c) Passive close(d) Passive openThis question was posed to me in an international level competition.I'm obligated to ask this question of TCP-2 topic in portion Transport Layer of Computer Network |
|
Answer» RIGHT answer is (a) ACTIVE OPEN The best I can explain: This is the second step in the Three-Way Handshaking process and is DONE by the client once it finds the open server and picks an ISN. The Server acknowledges the clients REQUEST, and then picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the servers ISN. |
|
| 27. |
The server program tells its TCP that it is ready to accept a connection. This process is called ___________(a) Active open(b) Active close(c) Passive close(d) Passive openI had been asked this question by my college professor while I was bunking the class.Query is from TCP-2 topic in portion Transport Layer of Computer Network |
|
Answer» The correct answer is (d) Passive open |
|
| 28. |
Connection establishment in TCP is done by which mechanism?(a) Flow control(b) Three-Way Handshaking(c) Forwarding(d) SynchronizationI had been asked this question by my school principal while I was bunking the class.I would like to ask this question from TCP-2 topic in section Transport Layer of Computer Network |
|
Answer» RIGHT answer is (b) Three-Way Handshaking The explanation is: A three-way handshake allows both, the SERVER and the client to CHOOSE their INITIAL Sequence Number and inform about it to the other party. This won’t be possible using the two-way handshake MECHANISM. |
|
| 29. |
Size of TCP segment header ranges between ___________(a) 16 and 32 bytes(b) 16 and 32 bits(c) 20 and 60 bytes(d) 20 and 60 bitsI had been asked this question in my homework.The above asked question is from TCP-2 topic in section Transport Layer of Computer Network |
|
Answer» The CORRECT choice is (c) 20 and 60 bytes |
|
| 30. |
The receiver of the data controls the amount of data that are to be sent by the sender is referred to as ___________(a) Flow control(b) Error control(c) Congestion control(d) Error detectionI had been asked this question by my school teacher while I was bunking the class.This interesting question is from TCP-2 in portion Transport Layer of Computer Network |
|
Answer» Correct answer is (a) FLOW control |
|
| 31. |
The value of acknowledgement field in a segment defines _______(a) sequence number of the byte received previously(b) total number of bytes to receive(c) sequence number of the next byte to be received(d) sequence of zeros and onesThe question was posed to me in a job interview.I'd like to ask this question from TCP-1 topic in portion Transport Layer of Computer Network |
|
Answer» CORRECT choice is (C) sequence number of the next byte to be received For explanation: The ACKNOWLEDGEMENT FIELD in a segment DEFINES the sequence number of the byte which is to be received next i.e. sequence number of byte that the sender should transmit next. |
|
| 32. |
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________(a) Fixed number(b) Random sequence of 0’s and 1’s(c) One(d) Sequence of zero’s and one’sI got this question in an interview.My query is from TCP-1 in section Transport Layer of Computer Network |
|
Answer» RIGHT option is (d) Sequence of zero’s and one’s The best I can explain: One might expect the sequence number of the first BYTE in the stream to be 0, or 1. But that does not happen in TCP, Instead, the SENDER has to choose an Initial Sequence Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the connection handshake. |
|
| 33. |
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?(a) 10000(b) 10001(c) 12001(d) 11001The question was posed to me at a job interview.I want to ask this question from TCP-1 in chapter Transport Layer of Computer Network |
|
Answer» CORRECT option is (b) 10001 Easiest explanation: The SEQUENCE number given to FIRST byte of a SEGMENT, with RESPECT to its order among the previous segments, is the sequence number of that segment. |
|
| 34. |
In segment header, sequence number and acknowledgement number fields refer to _______(a) Byte number(b) Buffer number(c) Segment number(d) AcknowledgmentThis question was addressed to me in exam.Question is taken from TCP-1 in portion Transport Layer of Computer Network |
|
Answer» The correct option is (a) Byte NUMBER |
|
| 35. |
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.(a) Packet(b) Buffer(c) Segment(d) AcknowledgmentI have been asked this question by my school principal while I was bunking the class.This interesting question is from TCP-1 in division Transport Layer of Computer Network |
|
Answer» Correct answer is (d) Acknowledgment |
|
| 36. |
Communication offered by TCP is ________(a) Full-duplex(b) Half-duplex(c) Semi-duplex(d) Byte by byteThe question was asked in an internship interview.The origin of the question is TCP-1 in division Transport Layer of Computer Network |
|
Answer» CORRECT option is (a) Full-duplex The explanation is: Data can flow both the directions at the same time during a TCP communication HENCE, it is full-duplex. This is the REASON why TCP is used in systems that require full-duplex operation such as e-mail systems. |
|
| 37. |
TCP groups a number of bytes together into a packet called _______(a) Packet(b) Buffer(c) Segment(d) StackThe question was posed to me during an online interview.My question is from TCP-1 in portion Transport Layer of Computer Network |
|
Answer» CORRECT choice is (c) SEGMENT Explanation: A segment may be collection of data from MANY send () STATEMENTS. TCP transmits each segment as a stream of BYTES. |
|
| 38. |
TCP process may not write and read data at the same speed. So we need __________ for storage.(a) Packets(b) Buffers(c) Segments(d) StacksI have been asked this question during an interview.My question comes from TCP-1 in division Transport Layer of Computer Network |
|
Answer» RIGHT ANSWER is (b) Buffers The best I can EXPLAIN: A TCP receiver has a receive buffer that is used to store the UNPROCESSED incoming packets in case the sender is sending packets faster than the processing rate of the received packets. |
|
| 39. |
In TCP, sending and receiving data is done as _______(a) Stream of bytes(b) Sequence of characters(c) Lines of data(d) PacketsI got this question in homework.Query is from TCP-1 topic in portion Transport Layer of Computer Network |
|
Answer» Right option is (a) Stream of bytes |
|
| 40. |
Which of the following is false with respect to TCP?(a) Connection-oriented(b) Process-to-process(c) Transport layer protocol(d) UnreliableI got this question during an interview.My question is from TCP-1 in portion Transport Layer of Computer Network |
|
Answer» The correct CHOICE is (d) Unreliable |
|