Olete.in
Articles
Mock Tests
đź§Ş PCIe (GEN3/4) protocols and standards MCQ Quiz Hub
Address Resolution Protocol Mcq
Choose a topic to test your knowledge and improve your PCIe (GEN3/4) protocols and standards skills
1. What connects IP address to the Physical address of devices?
Address Resolution Protocol
File Transfer Protocol
User Datagram Protocol
Transmission Control Protocol
2. How long is the IP address?
32 Bits
48 Bits
64 Bits
128 Bits
3. ______ translates address consisting 32 bits into 48 & Vice-versa?
Address Resolution Protocol
File Transfer Protocol
User Datagram Protocol
Transmission Control Protocol
4. What is the necessity of Address Resolution Protocol (ARP)?
Translate Address Bits
Finds MAC Address
Matches IP Address to MAC Address
All Mentioned Above
5. Address Resolution Protocol (ARP) cache is ________?
Static
Dynamic
Constant
Fixed
6. ARP cache’s size has been __________?
Limited by Design
Unlimited by Design
Undefined
Infinite
7. What is the use of ARP cache?
Design Intended for Privacy
Provides Security Prevents
IP Addresses From Stealing
All Mentioned Above
8. Unutilized address is removed in ________ process?
Holding
Purging
Dirtying
Keeping
9. What are the various types of ARP?
Proxy ARP
Reverse ARP
Inverse ARP
All Mentioned Above
10. In what technique, Proxy device answers the request of ARP?
Proxy ARP
Reverse ARP
Inverse ARP
Gratuitous ARP
11. What type of ARP doesn’t get prompted to the request made by ARP?
Proxy ARP
Reverse ARP
Inverse ARP
Gratuitous ARP
12. Host machines that don’t know their self IP address use ____________ to get discovered?
Proxy ARP
Reverse ARP
Inverse ARP
Gratuitous ARP
13. Without ________ ,it is impossible to detect the MAC address of other hosts?
Address Resolution Protocol
File Transfer Protocol
User Datagram Protocol
Transmission Control Protocol
14. ____ creates the entries of addresses on fly?
Address Resolution Protocol
File Transfer Protocol
User Datagram Protocol
Transmission Control Protocol
15. If _______ goes unsupported, entries in the directory made manually?
Address Resolution Protocol
File Transfer Protocol
User Datagram Protocol
Transmission Control Protocol
16. ARP Spoofing is also referred to as _______?
ARP Poison Routing
ARP Cache Poisoning
ARP Preference Routing
a & b
17. ______ attacks are considered to be dangerous?
ARP Poison Routing
ARP Cache Poisoning
ARP Spoofing
All Mentioned Above
18. What messages sent to the target in an ARP Poisoning attack?
Fake
Real
True
Rare
19. What is MITM ?
Man-in-the-Middle Attacks
Memory-to-Memory
Machine-to-Machine
Memory-to-Machine
20. In what type of attack do messages get altered between the parties?
ARP Poison Routing
ARP Cache Poisoning
ARP Spoofing
Man-in-the-Middle Attacks
21. What type of attack occurs if the malware gets distributed?
ARP Poison Routing
ARP Cache Poisoning
ARP Spoofing
Man-in-the-Middle Attacks
22. What happens in the MITM attack?
Messages are Manipulated
Malware gets Distributed
Attacker Control Victims Web Browser
All Mentioned Above
23. Why do MITM attacks occur?
To Capture Personal Information
To Capture Financial Data
a & b
Messages are not Transferred
24. ARP Spoofing enables ___________ cyberattacks?
Man-in-the-Middle Attacks
Denial-of-Service Attacks
Session Hijacking
All Mentioned Above
25. What attack occur on fraud victims with e-commerce websites and online banking?
Man-in-the-Middle Attacks
Denial-of-Service Attacks
Session Hijacking
All Mentioned Above
26. What is DoS Attack?
Denial-of-Service Attack
Distribution-of-Server Attack
Denial-of-Synchronization Attack
Distribution-of-Sync Attack
27. What attack makes user unable to access the system, network & server?
Man-in-the-Middle Attacks
Denial-of-Service Attacks
Session Hijacking
All Mentioned Above
28. DoS attack in large-scale is referred to as ________?
Distributed Denial-of-Service Attacks
Man-in-the-Middle Attacks
Session Hijacking
ARP Spoofing
29. More of the sources in a system are flooded with traffic in ________?
Distributed Denial-of-Service Attacks
Man-in-the-Middle Attacks
Session Hijacking
ARP Spoofing
30. ___ attacks can exploit the vulnerability in Network protocols?
Denial-of-Service Attacks
Man-in-the-Middle Attacks
Session Hijacking
ARP Spoofing
31. The services are easily overwhelmed and get unavailable in ________ attacks?n
Denial-of-Service Attacks
Man-in-the-Middle Attacks
Session Hijacking
ARP Spoofing
32. What happens if a cyber attacker steals a User ID?
Denial-of-Service Attacks
Man-in-the-Middle Attacks
Session Hijacking
ARP Spoofing
33. Attacker in ______ gets intercepted to authentication and intrudes for real?
Denial-of-Service Attacks
Man-in-the-Middle Attacks
Session Hijacking
ARP Spoofing
34. What is the size of the ARP Packet?
28 Bytes
28 Bits
32 Bytes
32 Bits
35. Which field specifies the Protocol type of Network link?
Hardware Type
Protocol Type
Sender Hardware Address
Sender Protocol Address
36. Internetwork protocol for ARP intended request is specified by ______?
Hardware Type
Protocol Type
Sender Hardware Address
Sender Protocol Address
37. __________ specify the address length of hardware?
Hardware Type
Sender Protocol Type
Hardware Address
Hardware Length
38. Length of Internetwork address is specified in _______?
Hardware Type
Protocol Type
Hardware Length
Protocol Length
39. What specifies the operation performed by the sender?
Hardware Type
Operation
Hardware Length
Protocol Length
40. What is the Sender Hardware Address?
Sender’s Media Address
Internetwork Address of Sender
Media Address of Intended Receiver
Internetwork Address of Receiver
41. What is the Sender Protocol Address?
Sender’s Media Address
Internetwork Address of Sender
Media Address of Intended Receiver
Internetwork Address of Receiver
42. ARP Requests get ignored in what field?
Hardware Type
Target Hardware Address
Hardware Length
Protocol Length
43. In ARP Reply ________ indicates the host address originated from the request of ARP?
Hardware Type
Target Hardware Address
Hardware Length
Protocol Length
44. What does a Target Protocol Address consist of?
Sender’s Media Address
Internetwork Address of Sender
Media Address of Intended Receiver
Internetwork Address of Receiver
45. What is IANA?
Internet Assigned Numbers Authority
Integer Addition Numbers Application
Income Assigned Numerical Authority
Internet Assigned Numerical Application
46. What is used as a simple protocol of announcement?
Address Resolution Protocol
File Transfer Protocol
User Datagram Protocol
Transmission Control Protocol
47. _______ is the broadcast of ARP request?
Proxy ARP
Reverse ARP
Inverse ARP
Gratuitous ARP
48. THA is set as _______ in the Gratuitous ARP message?
0
1
Infinite
Constant
49. _______ are standard based methods?
RP Request
ARP Reply
a & b
None
50. Which standard method of ARP is preferable?
ARP Request
ARP Reply
a & b
None
Submit