A family of network control protocols (NCPs) ______
1.Are a series of independently defined protocols that provide a dynamic
2. Are a series of independently-defined protocols that encapsulate
3.Are a series of independently defined protocols that provide transparent
4.The same as NFS
Posted Date:-2021-12-28 09:19:20
A unidirectional path switching ring is a network with __________
1. one ring
2.two rings
3.three rings
4.four rings
Posted Date:-2021-12-28 08:53:04
An RTP header has a minimum size of _________
1.12 bytes
2. 16 bytes
3.24 bytes
4.32 bytes
Posted Date:-2021-12-28 08:57:48
“Semantics-aware†signatures automatically generated by Nemean are based on traffic at which two layers?
1.Application layer and Transport layer
2. Network layer and Application layer
3.Session layer and Transport layer
4.Application layer and Session layer
Posted Date:-2021-12-28 09:14:52
In SONET, STS-1 level of electrical signalling has the data rate of _________
1. 51.84 Mbps
2.155.52 Mbps
3.2488.320 Mbps
4.622.080 Mbps
Posted Date:-2021-12-28 08:41:01
RPC is a _________
1.synchronous operation
2.asynchronous operation
3. time independent operation
4. channel specific operation
Posted Date:-2021-12-28 09:09:20
The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.
1.Link-termination phase
2.Link establishment phase
3.Authentication phase
4.Link dead phase
Posted Date:-2021-12-28 09:20:11
The PPP protocol ____
1.Is designed for simple links which transport packets between two peers
2.Is one of the protocols for making an Internet connection over a phone line
3.Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line
4. Is used for sharing bandwidth
Posted Date:-2021-12-28 09:17:02
What is the purpose of a shadow honeypot?
1. To flag attacks against known vulnerabilities
2. To help reduce false positives in a signature-based IDS
3.To randomly check suspicious traffic identified by an anomaly detection system
4.To enhance the accuracy of a traditional honeypot
Posted Date:-2021-12-28 09:13:10
Which one of the following is not correct?
1. RTCP provides canonical end-point identifiers to all session participants
2.RTCP reports are expected to be sent by all participants
3. RTCP itself does not provide any flow encryption or authentication methods
4.RTCP handles the actual data delivery
Posted Date:-2021-12-28 08:58:29
A false positive can be defined as _____
1. An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
2.An alert that indicates nefarious activity on a system that is not running on the network
3.The lack of an alert for nefarious activity
4. Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity
Posted Date:-2021-12-28 09:11:29
A linear SONET network can be ________
1.point-to-point
2.multi-point
3. both point-to-point and multi-point
4.single point
Posted Date:-2021-12-28 08:52:07
A Link Control Protocol (LCP) is used for _____
1.Establishing, configuring and testing the data-link connection
2.Establishing and configuring different network-layer protocols
3.Testing the different network-layer protocols
4.Provides for multiplexing of different network-layer protocols
Posted Date:-2021-12-28 09:18:51
A remote procedure call is _______
1.inter-process communication
2. a single process
3.a single thread
4. a single stream
Posted Date:-2021-12-28 09:06:24
A remote procedure is uniquely identified by _________
1.program number
2.version number
3.procedure number
4.all of the mentioned
Posted Date:-2021-12-28 09:07:45
An RPC (remote procedure call) is initiated by the _________
1. server
2.client
3.client after the sever
4. a third party
Posted Date:-2021-12-28 09:05:36
An RPC application requires _________
1.specific protocol for client server communication
2. a client program
3. a server program
4.all of the mentioned
Posted Date:-2021-12-28 09:08:24
An RTP session is established for ______
1.each media stream
2.all media streams
3.some predefined number of media streams
4.no media stream
Posted Date:-2021-12-28 08:56:35
At which two traffic layers do most commercial IDSes generate signatures?
1. Application layer and Network layer
2.Network layer and Session Layer
3.Transport layer and Application layer
4.Transport layer and Network layer
Posted Date:-2021-12-28 09:13:34
Automatic protection switching in linear network is defined at the _______
1. line layer
2. section layer
3.photonic layer
4. path layer
Posted Date:-2021-12-28 08:52:33
Choose the correct statement from the following.
1.PPP can terminate the link at any time
2.PPP can terminate the link only during the link establishment phase
3. PPP can terminate the link during the authentication phase
4.PPP can terminate the link during the callback control phase
Posted Date:-2021-12-28 09:19:46
EIGRP metric is ______
1.K-values
2. Bandwidth only
3.Hop Count
4.Delay only
Posted Date:-2021-12-28 09:21:16
IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
1.Inspection of password files to detect inadvisable passwords
2.Mechanisms put in place to reenact known methods of attack and record system responses
3.Inspection of system to detect policy violations
4.Inspection of configuration files to detect inadvisable settings
Posted Date:-2021-12-28 09:14:00
In RPC, while a server is processing the call, the client is blocked ________
1. unless the client sends an asynchronous request to the server
2.unless the call processing is complete
3. for the complete duration of the connection
4.unless the server is disconnected
Posted Date:-2021-12-28 09:06:02
In SONET, each synchronous transfer signal STS-n is composed of __________
1.2000 frames
2. 4000 frames
3.8000 frames
4.16000 frames
Posted Date:-2021-12-28 08:42:52
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?
1. Inside the firewall
2.Outside the firewall
3.Both inside and outside the firewall
4.Neither inside the firewall nor outside the firewall.
Posted Date:-2021-12-28 09:12:36
PPP consists of ________components
1. Three (encapsulating, the Domain Name system)
2.Three (encapsulating, a link control protocol, NCP)
3.Two (a link control protocol, Simple Network Control protocol)
4.One (Simple Network Control protocol)
Posted Date:-2021-12-28 09:17:57
PPP provides the _______ layer in the TCP/IP suite.
1.Link
2. Network
3.Transport
4. Application
Posted Date:-2021-12-28 09:17:30
Real-time transport protocol (RTP) is mostly used in ______
1.streaming media
2.video teleconference
3.television services
4. All of the mentioned
Posted Date:-2021-12-28 08:54:09
RPC allows a computer program to cause a subroutine to execute in _________
1. its own address space
2. another address space
3.both its own address space and another address space
4.applications address space
Posted Date:-2021-12-28 09:06:48
RPC is used to ______
1. establish a server on remote machine that can respond to queries
2.retrieve information by calling a query
3.establish a server on remote machine that can respond to queries and retrieve information by calling a query
4. to secure the client
Posted Date:-2021-12-28 09:08:49
RPC works between two processes. These processes must be _______
1.on the same computer
2.on different computers connected with a network
3.on the same computer and also on different computers connected with a network
4.on none of the computers
Posted Date:-2021-12-28 09:07:16
RTP can use ________
1.unprevileleged UDP ports
2.stream control transmission protocol
3.datagram congestion control protocol
4. All of the mentioned
Posted Date:-2021-12-28 08:57:00
RTP is used to ________
1.carry the media stream
2.monitor transmission statistics of streams
3.monitor quality of service of streams
4. secure the stream
Posted Date:-2021-12-28 08:54:32
RTP provides the facility of jitter _______
1.media stream
2. expansion
3.media modification
4. Security
Posted Date:-2021-12-28 08:55:44
SONET stands for ____
1. synchronous optical network
2.synchronous operational network
3. stream optical network
4.shell operational network
Posted Date:-2021-12-28 08:40:37
The local operating system on the server machine passes the incoming packets to the _______
1.server stub
2.client stub
3.client operating system
4. client process
Posted Date:-2021-12-28 09:09:45
The path layer of SONET is responsible for the movement of a signal _________
1.from its optical source to its optical destination
2. across a physical line
3. across a physical section
4.back to its optical source
Posted Date:-2021-12-28 08:42:04
The photonic layer of the SONET is similar to the __________ of OSI model.
1.network layer
2.data link layer
3.physical layer
4.Transport layer
Posted Date:-2021-12-28 08:42:29
The PPP encapsulation _______
1.Provides for multiplexing of different network-layer protocols
2.Requires framing to indicate the beginning and end of the encapsulation
3.Establishing, configuring and testing the data-link connection
4.Provides interface for handling the capabilities of the connection/link on the network
Posted Date:-2021-12-28 09:18:26
What is SDH?
1.sdh is similar standard to SONET developed by ITU-T
2.synchronous digital hierarchy
3.sdh stands for synchronous digital hierarchy and is a similar standard to SONET developed by ITU-T
4.none of the mentioned
Posted Date:-2021-12-28 08:53:30
When discussing IDS/IPS, what is a signature?
1.An electronic signature used to authenticate the identity of a user on the network
2.Attack-definition file
3.It refers to “normal,†baseline network behavior
4.It is used to authorize the users on a network
Posted Date:-2021-12-28 09:14:25
Which of the following is an advantage of anomaly detection?
1.Rules are easy to define
2.Custom protocols can be easily analyzed
3.The engine can scale as the rule set grows
4. Malicious activity that falls within normal usage patterns is detected
Posted Date:-2021-12-28 09:11:00
Which of the following is true of signature-based IDSes?
1.They alert administrators to deviations from “normal†traffic behavior
2.They identify previously unknown attacks
3.The technology is mature and reliable enough to use on production networks
4. They scan network traffic or packets to identify matches with attack-definition files
Posted Date:-2021-12-28 09:15:49
Which of the following is used to provide a baseline measure for comparison of IDSes?
1.Crossover error rate
2. False negative rate
3.False positive rate
4.Bit error rate
Posted Date:-2021-12-28 09:15:16
Which one of the following is not true about SONET?
1.frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
2.multiplexing is synchronous TDM
3.all clocks in the network are locked to a master clock
4. STS-1 provides the data rate of 622.080Mbps
Posted Date:-2021-12-28 08:43:20
Which one of the following multimedia formats can not be supported by RTP?
1.MPEG-4
2.MJPEG
3.MPEG
4. TXT
Posted Date:-2021-12-28 08:57:26
Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
1. SRTP
2. RTCP
3.RCP
4.RTCT
Posted Date:-2021-12-28 08:58:53
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?
1.LCP
2. NCP
3.Both LCP and NCP
4. TCP
Posted Date:-2021-12-28 09:16:32
Which protocol provides the synchronization between media streams?
1.RTP
2.RTCP
3.RPC
4.RTCT
Posted Date:-2021-12-28 08:56:10