MCQ Questions For BCA 6 Semester
MCQ Questions For BCA 6 Semester
Knowachiever
https://knowachiever.in/
Knowachiever - Always be ahead with us.
https://knowachiever.in/
Knowachiever - Always be ahead with us.
12 What does Message Integrity mean that the data must arrive at the
recipient exactly as delivered? No modifications in the data content
during transmission
13 What means that the data must arrive at the recipient exactly as
delivered?
Ans. Data integrity
14 What must the data integrity be protected for?
Ans. Secure transmission
15 What means that the recipient is confident of the sender s identity?
Ans. Endpoint authentication Authentication
16 Who delivered the message?
Ans. Impostor
17 What implies that the receiver must show that the received message
has originated from a specific sender?
Ans. NonRepudiation
18 What does NonRepudiation mean that the receiver must show that the
received message originated from a specific sender?
Ans. The sender shall not deny sending a communication that he or she sent
19 Who must show that the received message originated from a specific
sender?
Ans. The receiver
20 What does the bank have a piece of evidence that the customer has
requested for the transaction?
Ans. If a client submits a request to transfer the money from one account to
another account
21 What are unlawful acts against private, corporate or governmental IT
assets?
Ans. Attack Network security assaults
22 What are networks exposed to as more companies enable employees
to access data from mobile devices?
Ans. Data theft or total loss of the data or network
23 What does a network attack attempt to obtain unauthorized access to
an organization s network to do?
Ans. Steal data
24 What is the primary type of network attacks?
Ans. When sensitive information is filtered and watched
25 Who obtains access to a network and monitor or steal critical
information without making any modification to the data?
Ans. Passive Attackers
26 What type of attack is when information is changed by a hacker or
deleted entirely?
Ans. Active
27 What does Active Attackers do?
https://knowachiever.in/
Knowachiever - Always be ahead with us.
1 What secures your network and data against breaches, attacks and
other threats?
Ans. Network Security
2 What is Network Security a wide and encompassing word that
encompasses about network use, accessibility, and overall threat prevention?
14 What is the Overview of Step1 User login and request services on the
host?
Ans. Ticket for the Server Kerberos
15 What does the User ask for?
Ans. Ticketgranting service
16 What validates the User's access right using Database?
Ans. Step2 Authentication Server
17 How are results encrypted?
Ans. Password of the User
18 Step3 The message decryption is done using what?
Ans. The password
19 What does the Ticket contain?
Ans. Authenticators
20 What is the name of the server that validates the User's access right?
IP Security Architecture(Unit 3)
1 IPsec provides cryptographic protection for IP datagrams in which
packets?
Ans. IPv4 and IPv6 network packets
2 What is replay protection?
Ans. Partial sequence integrity
3 What is partial sequence integrity also known as?
Ans. Replay protection
4 IPsec is performed what?
Ans. Inside the IP module
5 What is a cryptographic protection for IP datagrams in IPv4 and IPv6
network packets?
Ans. IPsec
6 What architecture employs two protocols to protect the traffic or data
flow?
Ans. IPSec IP Security architecture
https://knowachiever.in/
Knowachiever - Always be ahead with us.
7 What two protocols are used to protect the traffic or data flow?
Ans. ESP Encapsulation Security Payload and AH Authentication Header
Authentication Header
8 What does IPSec Architecture contain?
Ans. Protocols, algorithms, DOI, and Key Management
9 What are the three major services of IP Security architecture?
Ans. Confidentiality Authentication Integirity IP Security Architecture IP
Security Architecture
10 What includes the broad ideas, terminology, protocols, algorithms and
security requirements of IP Security technology?
Ans. Architecture Architecture or IP Security Architecture
11 What gives the secrecy service?
Ans. ESP Protocol ESP Encapsulation Security Payload
12 What is ESP Encapsulation Security Payload implemented in either two
ways?
Ans. ESP with optional Authentication
13 What is ESP with?
Ans. Authentication
14 What is the IP Security Parameter Index SPI used in?
Ans. Security Association
15 What is the Sequence Number used to provide to the connection built
between the Client and Server?
Ans. Unique number
16 What is allotted to every packet so that at the receiver side, packages
can be arranged properly?
Ans. Sequence Number Unique Sequence numbers
17 What is the name of the data that is used in IPv4 and IPv6 network
packets?
Ans. Payload Data
18 What does the Payload data mean?
Ans. Accurate data or the actual message
19 What format is the Payload data in?
Ans. Encrypted format
20 What is the size of the extra bits of space in the original message?
Ans. Padding Extra bits of space added to the original message to maintain
confidentiality
21 What is the size of extra bits of space added to the original message?
Ans. HTTPS
9 What was SSL later developed into?
Ans. Transport Layer Security TLS
10 What does SSL TLS do to guarantee a high degree of privacy?
Ans. SSL encrypts data that is transferred across the web
https://knowachiever.in/
Knowachiever - Always be ahead with us.
Ans. GetRequest
15 How is GetRequest SNMP management used?
Ans. Retrieve data
16 Who can request data continuously until no more data is left?
Ans. SNMP agents
17 What does the SNMP agent respond to?
Ans. Response message
18 How can a message be delivered to a SNMP agent?
Ans. To determine what data is available on an SNMP agent
19 What can the SNMP manager do in this approach?
Ans. Gain knowledge of all the accessible data on the SNMP agent
20 What is used to obtain big data at once by the SNMP manager from the
SNMP agent?
Ans. GetBulkRequest
21 In what document is the InformRequest introduced?
Ans. SNMPv2c
22 What is SetRequest used by the SNMP manager to do?
Ans. Set the value of an object instance on the SNMP agent
23 What is a message sent by?
Ans. An agent
24 When sent in response to what message, it will include the data sought?
https://knowachiever.in/