100% found this document useful (2 votes)
869 views9 pages

CS432 Mcqs FinalTerm by Vu Topper RM

The document contains a series of multiple-choice questions related to computer security, networking, and programming concepts, likely intended for a final exam in a CS-432 course. Topics include reconnaissance techniques, web server functions, protocol usage, and performance metrics. Additionally, it provides contact information for assistance and promotes a YouTube channel for further resources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
869 views9 pages

CS432 Mcqs FinalTerm by Vu Topper RM

The document contains a series of multiple-choice questions related to computer security, networking, and programming concepts, likely intended for a final exam in a CS-432 course. Topics include reconnaissance techniques, web server functions, protocol usage, and performance metrics. Additionally, it provides contact information for assistance and promotes a YouTube channel for further resources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CS-432 Final Term By Vu Topper RM

For Help = 03224021365 , 03164980094


CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
In Active Reconnaissance, the intruder involves in __________.
A. sniffing
B. war driving
C. war dialing
D. port scanning

Frequency x Duration x Hour Cost = _____ .


A. Status
B. Loss Profit
C. All of the given
D. Hopping

__________ provides a repeatable quantitative score for computer


security vulnerabilities.
A. Users Security Scoring System
B. Security Management Base
C. Common Vulnerability Scoring System
D. Trusted Computing Base

Targeted Threat Index (TTI) can be represented mathematically as


TTI = ________ * Implementation
A. index value
B. solution
C. threat rate
D. method

Total time for N objects in non-persistent connection is ___________.


A. N*2RTT + N +Transmit time
B. N+2RTT + N*Transmit time
C. N+2RTT + N + Transmit time
D. N*2RTT + N*Transmit time
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
An attempt to make a machine or network resource unavailable to its
intended users is known as _________
A. Sniffer Attack
B. Worm Attack
C. Spoofing
D. DoS Attack

One of the main function of Web Server model is to handle multiple


____ requests.
A. End users
B. HTTP
C. session
D. HTML

Which of the following factors involved in characterizing the web


server?
A. Performance and usability
B. Processing time and Time out interval
C. Security and Adaptability
D. Scalability and Availability

____________is the level of human effort required to keep that system


operating at a satisfactory level
A. Extensibility
B. Manageability
C. Reliability
D. Availability

Rate jitter measures_______________between minimal and maximal


inter-arrival times
A. Difference
B. Addition
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
C. Average
D. Equality

Which of the following is not used to implement the DoS Attack?


A. Sniffer Attack
B. TCP Syn attack
C. Ping attack
D. Large computational load

A protocol used to deliver audio/ video over IP network is known as


____________
A. Real-time transfer Protocol
B. Real-time transmission Protocol
C. Real-time Transport Protocol
D. Real – time translation Protocol

HTTP is based on ______ messages.


A. random
B. multiple
C. users
D. sequenced

Total time for N objects in persistent connection is __________.


A. (N)*RTT + N*Transmit time
B. N*2RTT + N*Transmit time
C. 2RTT + N*Transmit time
D. (N+1)*RTT + N*Transmit time

The___________is the extension for Analysis file


A. .ini
B. .cc
C. .anf
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
D. .ned

The amount of useful traffic that is correctly transmitted, relative to total


traffic is called ____________
A. availability
B. delay
C. performance
D. accuracy

Which one of the following is NOT the factor affecting efficiency?


A. Hard drive size
B. Frame size
C. Serialization delay on WAN
D. Access protocols

In Easy Math writing rule “2-3-4” the number 4 represents more than
4________
A. Words
B. Sentences
C. Verbs
D. Adjective

The total number of bytes received in the network is represented


with_____________
A. total(rcvdByteCount)
B. sum(rcvdByteCount)
C. func(rcvdByteCount)
D. add(rcvdByteCount)

Application layer throughput provides insight into useful ________


A. performance
B. transmissions
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
C. recovery
D. terminations

Accuracy = [(Real value – Error) / _________ ] * 100


A. Other value
B. Maximum value
C. Minimum value
D. Real value

____________ Step is not included in Step wise approach to measure


downtime
A. Calculate cost
B. Simulate the outcome
C. Define What You Protect
D. Identify Business Continuity Components

Unplanned expansion causes performance ______________


A. Degradation
B. Enhanced
C. Better
D. Upgradation

Interactive Voice and video applications demand minimum_______


A. Delay
B. Accuracy
C. Bandwidth
D. Hardware

The TicToc's Processing delay can be controlled with the help of


_____________
A. Timer
B. Switch
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
C. Delayer
D. Boaste

Which of the following method is used to declare a two way gate


connection in OMNET++?
A. out
B. inout *
C. in
D. inout

OMNET++ allows visualizing outputs of_____________files


A. Character and string
B. Scalar and vector
C. Integer and binary
D. Float and binary

________ File Editor lets the user configure simulation models for
execution.
A. User
B. Basic
C. INI
D. Exe

What does the code “Simple toc5 extends txc5” represent


_____________?
A. Inheritance
B. Polymorphism
C. Overriding
D. Overloading

The syntax_____________________ is used to add parameter values?


A. parameters sendMsgOnInit: true;
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
B. parameters:: sendMsgOnInit = true;
C. parameters: sendMsgOnInit = true;
D. parameters. sendMsgOnInit = false;

A __________ is used to tell the compiler which source files you want to
compile.
A. Buildfile
B. Initfile
C. Makefile
D. Showfil

Which of the following is irrelevant for creating Tic.NED file?


A. Select “Empty Project with src and simulation folders”
B. Create Tic.cc file
C. Create Tic.NED file
D. Open project explorer

_____________________initializes module Txc4’s parameters


A. initialize():void Txc4
B. void Txc4::initialize()
C. void Txc4.initialize()
D. void Txc4: nitialize()

Two-way connections can ______________coding size


A. Maintain
B. Increase
C. Un-stabilize
D. Reduce
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094

Visit My YouTube Channel


For Subjective and More
Important Files
Channel Name = #VuTopperRM

You might also like