CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
In Active Reconnaissance, the intruder involves in __________.
A. sniffing
B. war driving
C. war dialing
D. port scanning
Frequency x Duration x Hour Cost = _____ .
A. Status
B. Loss Profit
C. All of the given
D. Hopping
__________ provides a repeatable quantitative score for computer
security vulnerabilities.
A. Users Security Scoring System
B. Security Management Base
C. Common Vulnerability Scoring System
D. Trusted Computing Base
Targeted Threat Index (TTI) can be represented mathematically as
TTI = ________ * Implementation
A. index value
B. solution
C. threat rate
D. method
Total time for N objects in non-persistent connection is ___________.
A. N*2RTT + N +Transmit time
B. N+2RTT + N*Transmit time
C. N+2RTT + N + Transmit time
D. N*2RTT + N*Transmit time
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
An attempt to make a machine or network resource unavailable to its
intended users is known as _________
A. Sniffer Attack
B. Worm Attack
C. Spoofing
D. DoS Attack
One of the main function of Web Server model is to handle multiple
____ requests.
A. End users
B. HTTP
C. session
D. HTML
Which of the following factors involved in characterizing the web
server?
A. Performance and usability
B. Processing time and Time out interval
C. Security and Adaptability
D. Scalability and Availability
____________is the level of human effort required to keep that system
operating at a satisfactory level
A. Extensibility
B. Manageability
C. Reliability
D. Availability
Rate jitter measures_______________between minimal and maximal
inter-arrival times
A. Difference
B. Addition
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
C. Average
D. Equality
Which of the following is not used to implement the DoS Attack?
A. Sniffer Attack
B. TCP Syn attack
C. Ping attack
D. Large computational load
A protocol used to deliver audio/ video over IP network is known as
____________
A. Real-time transfer Protocol
B. Real-time transmission Protocol
C. Real-time Transport Protocol
D. Real – time translation Protocol
HTTP is based on ______ messages.
A. random
B. multiple
C. users
D. sequenced
Total time for N objects in persistent connection is __________.
A. (N)*RTT + N*Transmit time
B. N*2RTT + N*Transmit time
C. 2RTT + N*Transmit time
D. (N+1)*RTT + N*Transmit time
The___________is the extension for Analysis file
A. .ini
B. .cc
C. .anf
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
D. .ned
The amount of useful traffic that is correctly transmitted, relative to total
traffic is called ____________
A. availability
B. delay
C. performance
D. accuracy
Which one of the following is NOT the factor affecting efficiency?
A. Hard drive size
B. Frame size
C. Serialization delay on WAN
D. Access protocols
In Easy Math writing rule “2-3-4” the number 4 represents more than
4________
A. Words
B. Sentences
C. Verbs
D. Adjective
The total number of bytes received in the network is represented
with_____________
A. total(rcvdByteCount)
B. sum(rcvdByteCount)
C. func(rcvdByteCount)
D. add(rcvdByteCount)
Application layer throughput provides insight into useful ________
A. performance
B. transmissions
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
C. recovery
D. terminations
Accuracy = [(Real value – Error) / _________ ] * 100
A. Other value
B. Maximum value
C. Minimum value
D. Real value
____________ Step is not included in Step wise approach to measure
downtime
A. Calculate cost
B. Simulate the outcome
C. Define What You Protect
D. Identify Business Continuity Components
Unplanned expansion causes performance ______________
A. Degradation
B. Enhanced
C. Better
D. Upgradation
Interactive Voice and video applications demand minimum_______
A. Delay
B. Accuracy
C. Bandwidth
D. Hardware
The TicToc's Processing delay can be controlled with the help of
_____________
A. Timer
B. Switch
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
C. Delayer
D. Boaste
Which of the following method is used to declare a two way gate
connection in OMNET++?
A. out
B. inout *
C. in
D. inout
OMNET++ allows visualizing outputs of_____________files
A. Character and string
B. Scalar and vector
C. Integer and binary
D. Float and binary
________ File Editor lets the user configure simulation models for
execution.
A. User
B. Basic
C. INI
D. Exe
What does the code “Simple toc5 extends txc5” represent
_____________?
A. Inheritance
B. Polymorphism
C. Overriding
D. Overloading
The syntax_____________________ is used to add parameter values?
A. parameters sendMsgOnInit: true;
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
B. parameters:: sendMsgOnInit = true;
C. parameters: sendMsgOnInit = true;
D. parameters. sendMsgOnInit = false;
A __________ is used to tell the compiler which source files you want to
compile.
A. Buildfile
B. Initfile
C. Makefile
D. Showfil
Which of the following is irrelevant for creating Tic.NED file?
A. Select “Empty Project with src and simulation folders”
B. Create Tic.cc file
C. Create Tic.NED file
D. Open project explorer
_____________________initializes module Txc4’s parameters
A. initialize():void Txc4
B. void Txc4::initialize()
C. void Txc4.initialize()
D. void Txc4: nitialize()
Two-way connections can ______________coding size
A. Maintain
B. Increase
C. Un-stabilize
D. Reduce
CS-432 Final Term By Vu Topper RM
For Help = 03224021365 , 03164980094
Visit My YouTube Channel
For Subjective and More
Important Files
Channel Name = #VuTopperRM