You are on page 1of 19

CHAPTER-28

NETWORK MANAGEMENT: SNMP


1. A manager is a host that runs the SNMP _______ process.
A)
client
B)
server
C)
both a and b
D)
none of the above
2. An SNMP agent can send _______ messages.
A)
Response
B)
GetRequest
C)
SetRequest
D)
none of the above
3. SMI uses another standard, ___________, to encode data to be transmitted over the
network.
A)
MIB
B)
ANS.1
C)
BER
D)
none of the above
4. We can compare the task of network management to the task of writing a program.
Both tasks need variable declarations. In network management this is handled by
_________.
A)
SMNP
B)
MIB
C)
SMI
D)
none of the above
5. We can compare the task of network management to the task of writing a program.
Both tasks need rules. In network management this is handled by ___________.
A)
SMNP
B)
MIB
C)
SMI
D)
none of the above
6. The _______ data types are atomic data types.
A)
structure
B)
simple
C)
both a and b
D)
none of the above
7. An SNMP agent can send _______ messages.
A)
GetRequest
B)
SetRequest
C)
Trap
D)
none of the above
8. Which is a manager duty?
A)
Retrieve the value of an object defined in an agent.
B)
Store the value of an object defined in an agent.
C)
a and b

D)
none of the above
9. We can compare the task of network management to the task of writing a program.
Both tasks have actions performed by statements. In network management this is
handled by _______.
A)
SMNP
B)
MIB
C)
SMI
D)
none of the above
10. An agent is a host or computer that runs the SNMP _______ process.
A)
client
B)
server
C)
both a and b
D)
none of the above
11. The Trap PDU is sent from the ______ to the _______ to report an event.
A)
server; client
B)
client; server
C)
network; host
D)
none of the above
12. To name objects globally, SMI uses an object identifier, which is a hierarchical
identifier based on a _______ structure.
A)
linear
B)
tree
C)
graph
D)
none of the above
13. INTEGER, OCTET STRING, and Object Identifier are _______ definitions used by
SMI.
A)
MIB
B)
SNMP
C)
ASN.1
D)
none of the above
14. The Response PDU is sent from the ______ to the ______ in response to GetRequest
or GetNextRequest.
A)
server; client
B)
client; server
C)
network; host
D)
none of the above
15. SMI emphasizes three attributes to handle an object: _____, ________, and
_________.
A)
name; data type; size
B)
name; size; encoding method
C)
name; data type; encoding method
D)
none of the above
16. SNMP uses the services of UDP on two well-known ports, _______ and _______.
A)
161; 162
B)
160; 161
C)
160; 162
D)
none of the above
17. SNMP uses two other protocols:________ and _________.

A)
MIB; SMTP
B)
SMI; MIB
C)
FTP; SMI
D)
none of the above
18. _______ runs the SNMP client program; _______ runs the SNMP server program.
A)
A manager; a manager
B)
An agent; an agent
C)
A manager; an agent
D)
An agent; a manager
19. An object id defines a _______. Add a zero suffix to define the _______.
A)
variable; table
B)
table; variable
C)
variable; variable contents
D)
none of the above
20. The _______ field in the SNMP PDU consists of a sequence of variables and their
corresponding values.
A)
version
B)
community
C)
VarBindList
D)
none of the above
21. SMI defines two structured data types: ________ and _________.
A)
sequence; atomic
B)
sequence; sequence of
C)
a sequence of; array
D)
none of the above
22. The _______ field in the SNMP PDU reports an error in a response message.
A)
community
B)
enterprise
C)
error status
D)
none of the above
23. All objects managed by SNMP are given an object identifier. The object identifier
always starts with _______.
A)
1.3.6.1.2.1
B)
1.3.6.1.2.2
C)
1.3.6.1.2.3
D)
none of the above
24. Which of the following could be a legitimate MIB object identifier?
A)
1.3.6.1.2.1.1
B)
1.3.6.1.2.2.1
C)
2.3.6.1.2.1.2
D)
none of the above
25. SMI has two broad categories of data type: _______ and _______.
A)
simple; complex
B)
simple; structured
C)
structured; unstructured
D)
none of the above
26. The _______ field in the SNMP PDU is an offset that points to the variable in error.
A)
community

B)
enterprise
C)
error index
D)
none of the above
27. SNMP defines the ___________________ to be sent from a manager to an agent and
vice versa.
A)
format of the packets
B)
encoding of the packets
C)
number of packets
D)
none of the above
28. The GetRequest PDU is sent from the _______ to the __________ to retrieve the
value of a variable or a set of variables.
A)
client; server
B)
server; client
C)
server; network
D)
none of the above
29. The _________ ordering enables a manager to access a set of variables one after
another by defining the first variable.
A)
lexicographic
B)
linear
C)
non-linear
D)
none of the above
30. To define the data type, SMI uses fundamental _______ definitions and adds some
new definitions.
A)
AMS.1
B)
ASN.1
C)
ASN.2
D)
none of the above
31. ________ defines the general rules for naming objects, defining object types, and
showing how to encode objects and values.
A)
MIB
B)
BER
C)
SMI
D)
none of the above
32. For a 1-byte length field, what is the maximum value for the data length?
A)
127
B)
128
C)
255
D)
none of the above

CHAPTER-29

MULTIMEDIA
1. _______ is a standard to allow telephones on the public telephone network to talk to
computers connected to the Internet.
A)
SIP
B)
H.323
C)
Q.991
D)
none of the above
2. When there is more than one source, the _______ identifier defines the mixer.
A)
synchronization source
B)
contributor
C)
timestamp
D)
none of the above
3. __________ is the protocol designed to handle real-time traffic on the Internet.
A)
TCP
B)
UDP
C)
RTP
D)
none of the above
4. Jitter is introduced in real-time data by the _______________.
A)
error caused during transmission
B)
delay between packets
C)
both a and b
D)
none of the above
5. In a real-time video conference, data from the server is _______ to the client sites.
A)
unicast
B)
multicast
C)
broadcast
D)
none of the above
6. An RTP packet is encapsulated in _______.
A)
a UDP user datagram
B)
a TCP segment
C)
an IP datagram
D)
none of the above
7. A _______ changes the format of a high-bandwidth video signal to a lower quality
narrow-bandwidth signal.
A)
timestamp
B)
sequence number
C)
translator
D)
none of the above
8. ____________ is used to compress video.
A)
MPEG
B)
JPEG
C)
either a or b
D)
none of the above
9. Real-time traffic needs the support of ____________.

A)
broadcasting
B)
multicasting
C)
both a and b
D)
none of the above
10. _______ are used to number the packets of a real-time transmission.
A)
Timestamps
B)
Playback buffers
C)
Sequence numbers
D)
none of the above
11. The third phase of JPEG is ___________.
A)
DCT transformation
B)
quantization
C)
data compression
D)
none of the above
12. The second phase of JPEG is ___________.
A)
DCT transformation
B)
quantization
C)
data compression
D)
none of the above
13. A __________on each packet is required for real-time traffic.
A)
timestamp
B)
sequence number
C)
both a and b
D)
none of the above
14. To prevent _________, we can timestamp the packets and separate the arrival time
from the playback time.
A)
error
B)
jitter
C)
either a or b
D)
none of the above
15. __________ means combining several streams of traffic into one stream.
A)
Translation
B)
Mixing
C)
both a and b
D)
none of the above
16. A real-time video performance lasts 10 min. If there is jitter in the system, the viewer
spends _______ minutes watching the performance.
A)
less than 10
B)
more than 10
C)
exactly 10
D)
none of the above
17. ___________ audio/video refers to the broadcasting of radio and TV programs
through the Internet.
A)
Interactive
B)
Streaming live
C)
Streaming stored
D)
none of the above

18. __________ means changing the encoding of a payload to a lower quality to match
the bandwidth of the receiving network.
A)
Translation
B)
Mixing
C)
both a and b
D)
none of the above
19. ____________ is used to compress images.
A)
MPEG
B)
JPEG
C)
either a or b
D)
none of the above
20. A ________buffer is required for real-time traffic.
A)
playback
B)
reordering
C)
sorting
D)
none of the above
21. In ________ encoding, the differences between the samples are encoded instead of
encoding all the sampled values.
A)
predictive
B)
perceptual
C)
both a and b
D)
none of the above
22. __________ encoding is based on the science of psychoacoustics, which is the study
of how people perceive sound.
A)
Predictive
B)
Perceptual
C)
both a and b
D)
none of the above
23. _________ audio/video refers to the use of the Internet for interactive audio/video
applications.
A)
Interactive
B)
Streaming live
C)
Streaming stored
D)
none of the above
24. According to the Nyquist theorem, we need to sample an analog signal
________times the highest frequency.
A)
three
B)
two
C)
four
D)
none of the above
25. ___________ is an application protocol that establishes, manages, and terminates a
multimedia session.
A)
RIP
B)
SIP
C)
DIP
D)
none of the above
26. _________ is not suitable for interactive multimedia traffic because it retransmits
packets in case of errors.

A)
UDP
B)
TCP
C)
both a and b
D)
none of the above
27. RTCP uses an odd-numbered _______ port number that follows the port number
selected for RTP.
A)
UDP
B)
TCP
C)
both a and b
D)
none of the above
28. We can divide audio and video services into _______ broad categories.
A)
three
B)
two
C)
four
D)
none of the above
29. RTP uses a temporary even-numbered _______ port.
A)
UDP
B)
TCP
C)
both a and b
D)
none of the above
30. ________ audio/video refers to on-demand requests for compressed audio/video files.
A)
Streaming live
B)
Streaming stored
C)
Interactive
D)
none of the above
31. ___________ is a protocol for controlling the flow and quality of data.
A)
RTP
B)
RTCP
C)
UDP
D)
none of the above
32. A _______ adds signals from different sources to create a single signal.
A)
timestamp
B)
sequence number
C)
mixer
D)
none of the above
33. A _______ shows the time a packet was produced relative to the first or previous
packet.
A)
timestamp
B)
playback buffer
C)
sequence number
D)
none of the above
34. The first phase of JPEG is ___________.
A)
DCT transformation
B)
quantization
C)
data compression
D)
none of the above

CHAPTER-30

CRYPTOGRAPHY
1.One commonly used public-key cryptography method is the ______ algorithm.
A)
RSS
B)
RAS
C)
RSA
D)
RAA
2. A(n) ______ algorithm transforms ciphertext to plaintext.
A)
encryption
B)
decryption
C)
either (a) or (b)
D)
neither (a) nor (b)
3. The ________ is the message after transformation.
A)
ciphertext
B)
plaintext
C)
secret-text
D)
none of the above
4. A(n) _______ algorithm transforms plaintext to ciphertext.
A)
encryption
B)
decryption
C)
either (a) or (b)
D)
neither (a) nor (b)
5. The ________ method provides a one-time session key for two parties.
A)
Diffie-Hellman
B)
RSA
C)
DES
D)
AES
6. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses
a formula to define the relationship between the input stream and the output stream.
A)
S-box
B)
P-box
C)
T-box
D)
none of the above
7. A ________ cipher replaces one character with another character.
A)
substitution
B)
transposition
C)
either (a) or (b)
D)
neither (a) nor (b)
8. The ________ cipher reorders the plaintext characters to create a ciphertext.
A)
substitution
B)
transposition
C)
either (a) or (b)
D)
neither (a) nor (b)
9. _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block
of data.

A)
AEE
B)
AED
C)
AER
D)
AES
10. The ________is the original message before transformation.
A)
ciphertext
B)
plaintext
C)
secret-text
D)
none of the above
11. A modern cipher is usually a complex _____cipher made of a combination of
different simple ciphers.
A)
round
B)
circle
C)
square
D)
none of the above
12. The _________ attack can endanger the security of the Diffie-Hellman method if
two parties are not authenticated to each other.
A)
man-in-the-middle
B)
ciphertext attack
C)
plaintext attack
D)
none of the above
13. A combination of an encryption algorithm and a decryption algorithm is called a
________.
A)
cipher
B)
secret
C)
key
D)
none of the above
14. In an asymmetric-key cipher, the receiver uses the ______ key.
A)
private
B)
public
C)
either a or b
D)
neither (a) nor (b)
15. AES has _____ different configurations.
A)
two
B)
three
C)
four
D)
five
16. DES is a(n) ________ method adopted by the U.S. government.
A)
symmetric-key
B)
asymmetric-key
C)
either (a) or (b)
D)
neither (a) nor (b)
17. DES uses a key generator to generate sixteen _______ round keys.
A)
32-bit
B)
48-bit
C)
54-bit
D)
42-bit

18. The Caesar cipher is a _______cipher that has a key of 3.


A)
transposition
B)
additive
C)
shift
D)
none of the above
19. ECB and CBC are ________ ciphers.
A)
block
B)
stream
C)
field
D)
none of the above
20. A(n) _______is a keyless transposition cipher with N inputs and M outputs that
uses a table to define the relationship between the input stream and the output stream.
A)
S-box
B)
P-box
C)
T-box
D)
none of the above
21. ________ DES was designed to increase the size of the DES key.
A)
Double
B)
Triple
C)
Quadruple
D)
none of the above
22. ________ is the science and art of transforming messages to make them secure
and immune to attacks.
A)
Cryptography
B)
Cryptoanalysis
C)
either (a) or (b)
D)
neither (a) nor (b)
23. DES has an initial and final permutation block and _________ rounds.
A)
14
B)
15
C)
16
D)
none of the above
24. The DES function has _______ components.
A)
2
B)
3
C)
4
D)
5
25. In a(n) ________ cipher, the same key is used by both the sender and receiver.
A)
symmetric-key
B)
asymmetric-key
C)
either (a) or (b)
D)
neither (a) nor (b)
26. _________ ciphers can be categorized into two broad categories: monoalphabetic
and polyalphabetic.
A)
Substitution
B)
Transposition
C)
either (a) or (b)

D)
neither (a) nor (b)
27. The _______ cipher is the simplest monoalphabetic cipher. It uses modular
arithmetic with a modulus of 26.
A)
transposition
B)
additive
C)
shift
D)
none of the above
28. In an asymmetric-key cipher, the sender uses the__________ key.
A)
private
B)
public
C)
either (a) or (b)
D)
neither (a) nor (b)
29. In a(n) ________ cipher, a pair of keys is used.
A)
symmetric-key
B)
asymmetric-key
C)
either (a) or (b)
D)
neither (a) nor (b)
30. The _______ is a number or a set of numbers on which the cipher operates.
A)
cipher
B)
secret
C)
key
D)
none of the above
31. In a(n) ________, the key is called the secret key.
A)
symmetric-key
B)
asymmetric-key
C)
either (a) or (b)
D)
neither (a) nor (b)

CHAPTER-31

NETWORK SECURITY
1. Message_____ means that the data must arrive at the receiver exactly as sent.
A)
confidentiality
B)
integrity
C)
authentication
D)
none of the above
2. Message _______ means that the receiver is ensured that the message is coming from
the intended sender, not an imposter.
A)
confidentiality
B)
integrity
C)
authentication
D)
none of the above
3. A(n) ________function creates a message digest out of a message.
A)
encryption

B)
decryption
C)
hash
D)
none of the above
4. The secret key between members needs to be created as a ______ key when two
members contact KDC.
A)
public
B)
session
C)
complimentary
D)
none of the above
5. The ________ criterion ensures that a message cannot easily be forged.
A)
one-wayness
B)
weak-collision-resistance
C)
strong-collision-resistance
D)
none of the above
6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
A)
KDC
B)
CA
C)
KDD
D)
none of the above
7. A witness used in entity authentication is ____________.
A)
something known
B)
something possessed
C)
something inherent
D)
all of the above
8. A _______ message digest is used as an MDC.
A)
keyless
B)
keyed
C)
either (a) or (b)
D)
neither (a) nor (b)
9. A(n)______ creates a secret key only between a member and the center.
A)
CA
B)
KDC
C)
KDD
D)
none of the above
10. ________ means to prove the identity of the entity that tries to access the system's
resources.
A)
Message authentication
B)
Entity authentication
C)
Message confidentiality
D)
none of the above
11. A ________ signature is included in the document; a _______ signature is a separate
entity.
A)
conventional; digital
B)
digital; digital
C)
either (a) or (b)
D)
neither (a) nor (b)
12. If _________ is needed, a cryptosystem must be applied over the scheme.
A)
integrity

B)
confidentiality
C)
nonrepudiation
D)
authentication
13. Digital signature provides ________.
A)
authentication
B)
nonrepudiation
C)
both (a) and (b)
D)
neither (a) nor (b)
14. Digital signature cannot provide ________ for the message.
A)
integrity
B)
confidentiality
C)
nonrepudiation
D)
authentication
15. To authenticate the data origin, one needs a(n) _______.
A)
MDC
B)
MAC
C)
either (a) or (b)
D)
neither (a) nor (b)
16. A(n) _________ can be used to preserve the integrity of a document or a message.
A)
message digest
B)
message summary
C)
encrypted message
D)
none of the above
17. Challenge-response authentication can be done using ________.
A)
symmetric-key ciphers
B)
asymmetric-key ciphers
C)
keyed-hash functions
D)
all of the above
18. The _______criterion ensures that we cannot find two messages that hash to the same
digest.
A)
one-wayness
B)
weak-collision-resistance
C)
strong-collision-resistance
D)
none of the above
19. A digital signature needs a(n)_________ system.
A)
symmetric-key
B)
asymmetric-key
C)
either (a) or (b)
D)
neither (a) nor (b)
20. A(n) ________is a federal or state organization that binds a public key to an entity
and issues a certificate.
A)
KDC
B)
Kerberos
C)
CA
D)
none of the above
21. Message ________ means that the sender and the receiver expect privacy.
A)
confidentiality
B)
integrity

C)
authentication
D)
none of the above
22. In ________ authentication, the claimant proves that she knows a secret without
actually sending it.
A)
password-based
B)
challenge-response
C)
either (a) or (b)
D)
neither (a) nor (b)
23. In _______, a claimant proves her identity to the verifier by using one of the three
kinds of witnesses.
A)
message authentication
B)
entity authentication
C)
message confidentiality
D)
message integrity
24. The _______ criterion states that it must be extremely difficult or impossible to create
the message if the message digest is given.
A)
one-wayness
B)
weak-collision-resistance
C)
strong-collision-resistance
D)
none of the above
25. A(n) ______ is a hierarchical system that answers queries about key certification.
A)
KDC
B)
PKI
C)
CA
D)
none of the above
26. _________ means that a sender must not be able to deny sending a message that he
sent.
A)
Confidentiality
B)
Integrity
C)
Authentication
D)
Nonrepudiation
27. A hash function must meet ________ criteria.
A)
two
B)
three
C)
four
D)
none of the above
28. __________ is a popular session key creator protocol that requires an authentication
server and a ticket-granting server.
A)
KDC
B)
Kerberos
C)
CA
D)
none of the above
29. Password-based authentication can be divided into two broad categories: _______ and
_______.
A)
fixed; variable
B)
time-stamped; fixed
C)
fixed; one-time
D)
none of the above

CHAPTER-32

SECURITY IN THE INTERNET: IPSEC, SSL/TLS,


PGP, VPN, AND FIREWALLS
1. _________ operates in the transport mode or the tunnel mode.
A)
IPSec
B)
SSL
C)
PGP
D)
none of the above
2. IKE creates SAs for _____.
A)
SSL
B)
PGP
C)
IPSec
D)
VP
3. ______ provides either authentication or encryption, or both, for packets at the IP
level.
A)
AH
B)
ESP
C)
PGP
D)
SSL
4. One security protocol for the e-mail system is _________.
A)
IPSec
B)
SSL
C)
PGP
D)
none of the above
5. Typically, ______ can receive application data from any application layer protocol,
but the protocol is normally HTTP.
A)
SSL
B)
TLS
C)
either (a) or (b)
D)
both (a) and (b)
6. IKE is a complex protocol based on ______ other protocols.
A)
two
B)
three
C)
four
D)
five
7. IPSec defines two protocols: _______ and ________.
A)
AH; SSL
B)
PGP; ESP
C)
AH; ESP
D)
all of the above
8. In the ______ mode, IPSec protects information delivered from the transport layer to
the network layer.
A)
transport
B)
tunnel

C)
either (a) or (b)
D)
neither (a) nor (b)
9. ______ is the protocol designed to create security associations, both inbound and
outbound.
A)
SA
B)
CA
C)
KDC
D)
IKE
10. A _______network is used inside an organization.
A)
private
B)
public
C)
semi-private
D)
semi-public
11. SSL provides _________.
A)
message integrity
B)
confidentiality
C)
compression
D)
all of the above
12. The Internet authorities have reserved addresses for _______.
A)
intranets
B)
internets
C)
extranets
D)
none of the above
13. An _________ is a network that allows authorized access from outside users.
A)
intranet
B)
internet
C)
extranet
D)
none of the above
14. _________ is a collection of protocols designed by the IETF (Internet Engineering
Task Force) to provide security for a packet at the network level.
A)
IPSec
B)
SSL
C)
PGP
D)
none of the above
15. IKE uses _______.
A)
Oakley
B)
SKEME
C)
ISAKMP
D)
all of the above
16. IPSec uses a set of SAs called the ________.
A)
SAD
B)
SAB
C)
SADB
D)
none of the above
17. An ________ is a private network that uses the Internet model.
A)
intranet
B)
internet
C)
extranet

D)
none of the above
18. ______ is actually an IETF version of _____.
A)
TLS; TSS
B)
SSL; TLS
C)
TLS; SSL
D)
SSL; SLT
19. In ______, there is a single path from the fully trusted authority to any certificate.
A)
X509
B)
PGP
C)
KDC
D)
none of the above
20. The combination of key exchange, hash, and encryption algorithms defines a
________ for each SSL session.
A)
list of protocols
B)
cipher suite
C)
list of keys
D)
none of the above
21. A ______ provides privacy for LANs that must communicate through the global
Internet.
A)
VPP
B)
VNP
C)
VNN
D)
VPN
22. _______ uses the idea of certificate trust levels.
A)
X509
B)
PGP
C)
KDC
D)
none of the above
23. IPSec in the ______ mode does not protect the IP header.
A)
transport
B)
tunnel
C)
either (a) or (b)
D)
neither (a) nor (b)
24. ________ provides privacy, integrity, and authentication in e-mail.
A)
IPSec
B)
SSL
C)
PGP
D)
none of the above
25. In _____, there can be multiple paths from fully or partially trusted authorities.
A)
X509
B)
PGP
C)
KDC
D)
none of the above
26. ______ provides authentication at the IP level.
A)
AH
B)
ESP
C)
PGP
D)
SSL

27. In _______, the cryptographic algorithms and secrets are sent with the message.
A)
IPSec
B)
SSL
C)
TLS
D)
PGP
28. ______ is designed to provide security and compression services to data generated
from the application layer.
A)
SSL
B)
TLS
C)
either (a) or (b)
D)
both (a) and (b)
29. _______ provide security at the transport layer.
A)
SSL
B)
TLS
C)
either (a) or (b)
D)
both (a) and (b)
30. The _______ mode is normally used when we need host-to-host (end-to-end)
protection of data.
A)
transport
B)
tunnel
C)
either (a) or (b)
D)
neither (a) nor (b)
31. In the _______ mode, IPSec protects the whole IP packet, including the original IP
header.
A)
transport
B)
tunnel
C)
either (a) or (b)
D)
neither (a) nor (b)
32. ______ was invented by Phil Zimmerman.
A)
IPSec
B)
SSL
C)
PGP
D)
none of the above
33. A _______ layer security protocol provides end-to-end security services for
applications.
A)
data link
B)
network
C)
transport
D)
none of the above
34. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
A)
secret
B)
public
C)
either (a) or (b)
D)
both (a) and (b)

You might also like