Home / Computer MCQs / Department 38 / Page 1

Computer MCQ Questions with answers

Here Important Computer MCQ questions are added which are frequently asked in almost all the examinations. You can check the correct answer of any question on clicking the show answer button or on option itself. The Correct answer will be displayed below. You can share any question with your friends on whatsapp by tapping whatsapp button.

Learn Computer mcqs in hindi here.

Tags: Computer mcqs, important mcqs of Computer, Computer important Computer mcqs, mcqs on Computer, important mcqs on Computer, mcqs of Computer

Learn Computer MCQs [Page 1 of Department 38]

R

Renu Phogat • 1.50K Points
Master

1) Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?

(A) ftp
(B) rexec
(C) tcpexec
(D) telnet
Correct Answer - Option (C)

Explanation:
Trusted TCP/IP commands such as ftp, rexec and telnet have the same needs & go through the identical verification process. Internet & TCP/IP are often implemented synonymously.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

2) Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________

(A) address, name
(B) address, location
(C) network, name
(D) network, location
Correct Answer - Option (A)

Explanation:
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP)’s address & name. This avoids a remote host to masquerade as an added remote host.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

3) RoBOT is abbreviated as ___________

(A) Return of Bleichenbacher’s Oracle Team
(B) Rise of Bleichenbacher’s Oracle Threat
(C) Return of Bleichenbacher’s Operational Threat
(D) Return of Bleichenbacher’s Oracle Threat
Correct Answer - Option (D)

Explanation:
Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

4) There are __________ different versions of IP popularly used.

(A) 2
(B) 3
(C) 4
(D) 5
Correct Answer - Option (A)

Explanation:
There are two different versions of IPs used popularly over the internet. These are IPv4 and IPv6. IPv4 is a 32-bits numeric address written in decimal with 4 numbers separated by dots whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

5) ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

(A) TCP Spoofing
(B) TCP Blind Spoofing
(C) IP Spoofing
(D) IP Blind Spoofing
Correct Answer - Option (B)

Explanation:
TCP Blind Spoofing is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

6) ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.

(A) SYN flooding attack
(B) ACK flooding attack
(C) SYN & ACK flooding attack
(D) Packet flooding attack
Correct Answer - Option (A)

Explanation:
SYN flooding attack is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. The SYN & ACK segments need to begin in a TCP connection.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

7) Which of them is not an attack done in the network layer of the TCP/IP model?

(A) MITM attack
(B) DoS attack
(C) Spoofing attack
(D) Shoulder surfing
Correct Answer - Option (D)

Explanation:
MITM, Denial of Service (DoS), and spoofing attacks are possible in the network layer of the TCP/IP model. It is important to secure the network layer as it is the only means to make certain that your application is not getting flooded with attacks.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

8) Which of them is not an appropriate method of router security?

(A) Unused ports should be blocked
(B) Unused interfaces and services should be disabled
(C) Routing protocol needs to be programmed by security experts
(D) Packet filtering needs to be enabled
Correct Answer - Option (C)

Explanation:
Unused ports should be blocked, Unused interfaces and services should be disabled, and Packet filtering needs to be enabled are some of the security measures that need to be taken for the routers.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

9) Which 2 protocols are used in the Transport layer of the TCP/IP model?

(A) UDP and HTTP
(B) TCP and UDP
(C) HTTP and TCP
(D) ICMP and HTTP
Correct Answer - Option (B)

Explanation:
The transport layer can voluntarily declare the consistency of communications. Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) are the most common transport layer protocols.

Share in MCQ Buddy Groups

Share

R

Renu Phogat • 1.50K Points
Master

10) Which of the protocol is not used in the network layer of the TCP/IP model?

(A) ICMP
(B) IP
(C) IGMP
(D) HTTP
Correct Answer - Option (D)

Explanation:
Internet Control Message Protocol (ICMP), Internet Protocol (IP) and Internet Group Management Protocol (IGMP) are used in the network layer. HTTP is used in application layer of TCP/IP model.

Share in MCQ Buddy Groups

Share

You are learning MCQ Questions of Computer Department : 38 | Page : 1

Attempt 350+ Quizzes on Computer

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image

MCQ Buddy is a community website which helps students in learning new questions, topics, hindi questions, programming questions, cbse questions. These questions are shared by registered users. You can also share question in this portal. Sign Up to share, upvote, add solution/explation of any question.
Sharing is Caring. Help other students by sharing questions, update solutions/explanations of questions added.

Login

Forgot username? click here

Forgot password? Click here

Don't have account? Register here.