MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server? |
| A. | Public |
| B. | Private |
| C. | Nocache/nostore |
| D. | Maxage |
| Answer» C. Nocache/nostore | |
| 202. |
Which of the following HTTP method should be idempotent in nature? |
| A. | OPTIONS |
| B. | DELETE |
| C. | POST |
| D. | HEAD |
| Answer» C. POST | |
| 203. |
Which of the following is a best practice to create a standard URI for a web service? |
| A. | Maintain Backward Compatibility |
| B. | Use HTTP Verb |
| C. | Both of the mentioned |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 204. |
Which of the following protocol is used by Restful web services as a medium of communication between client and server? |
| A. | HTTP |
| B. | FTP |
| C. | Gopher |
| D. | None of the mentioned |
| Answer» B. FTP | |
| 205. |
What REST stands for? |
| A. | Represent State Transfer |
| B. | Representational State Transfer |
| C. | Represent State Transfer |
| D. | None of the mentioned |
| Answer» C. Represent State Transfer | |
| 206. |
What is the constraint on the data per cookie? |
| A. | 2 KB |
| B. | 1 KB |
| C. | 4 KB |
| D. | 3 KB |
| Answer» D. 3 KB | |
| 207. |
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value? |
| A. | EncodeURIComponent() |
| B. | EncodeURI() |
| C. | EncodeComponent() |
| D. | None of the mentioned |
| Answer» B. EncodeURI() | |
| 208. |
Which of the following is a Boolean cookie attribute? |
| A. | Bool |
| B. | Secure |
| C. | Lookup |
| D. | Domain |
| Answer» C. Lookup | |
| 209. |
How can you set a Cookie visibility scope to local Storage? |
| A. | / |
| B. | % |
| C. | * |
| D. | All of the mentioned |
| Answer» B. % | |
| 210. |
Which of the following can be used to configure the scope of the Cookie visibility? |
| A. | Path |
| B. | Domain |
| C. | Both Path and Domain |
| D. | None of the mentioned |
| Answer» E. | |
| 211. |
Which of the following defines the Cookie visibility? |
| A. | Document Path |
| B. | LocalStorage |
| C. | SessionStorage |
| D. | All of the mentioned |
| Answer» E. | |
| 212. |
Which attribute is used to extend the lifetime of a cookie? |
| A. | Higherage |
| B. | Increaseage |
| C. | Maxage |
| D. | Lifetime |
| Answer» D. Lifetime | |
| 213. |
Which of the following explains Cookies nature? |
| A. | Non Volatile |
| B. | Volatile |
| C. | Intransient |
| D. | Transient |
| Answer» E. | |
| 214. |
The Cookie manipulation is done using which property? |
| A. | cookie |
| B. | cookies |
| C. | manipulate |
| D. | none of the mentioned |
| Answer» B. cookies | |
| 215. |
Cookies were originally designed for |
| A. | Client side programming |
| B. | Server side programming |
| C. | Both Client side programming and Server side programming |
| D. | None of the mentioned |
| Answer» C. Both Client side programming and Server side programming | |
| 216. |
In Int Address class which method returns the host name of the IP Address? |
| A. | Public String get Hostname() |
| B. | Public String getHostAddress() |
| C. | Public static IntAddress get Localhost() |
| D. | None of the mentioned |
| Answer» B. Public String getHostAddress() | |
| 217. |
Which classes are used for connection-less socket programming? |
| A. | Datagram Socket |
| B. | Datagram Packet |
| C. | Both Datagram Socket & Datagram Packet |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 218. |
What does the java.net.InetAddress class represent? |
| A. | Socket |
| B. | IP Address |
| C. | Protocol |
| D. | MAC Address |
| Answer» C. Protocol | |
| 219. |
TCP, FTP, Telnet, SMTP, POP etc. are examples of? |
| A. | Socket |
| B. | IP Address |
| C. | Protocol |
| D. | MAC Address |
| Answer» D. MAC Address | |
| 220. |
The client in socket programming must know which information? |
| A. | IP address of Server |
| B. | Port number |
| C. | Both IP address of Server & Port number |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 221. |
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number? |
| A. | Datagram Socket(int port) |
| B. | Datagram Socket(int port, Int Address address) |
| C. | Datagram Socket() |
| D. | None of the mentioned |
| Answer» C. Datagram Socket() | |
| 222. |
Which methods are commonly used in Server Socket class? |
| A. | Public Output Stream get Output Stream () |
| B. | Public Socket accept () |
| C. | Public synchronized void close () |
| D. | None of the mentioned |
| Answer» C. Public synchronized void close () | |
| 223. |
In FTP protocol, client contacts server using _________ as the transport protocol. |
| A. | Transmission control protocol |
| B. | User datagram protocol |
| C. | Datagram congestion control protocol |
| D. | Stream control transmission protocol |
| Answer» B. User datagram protocol | |
| 224. |
In the network HTTP resources are located by |
| A. | Uniform resource identifier |
| B. | Unique resource locator |
| C. | Unique resource identifier |
| D. | None of the mentioned |
| Answer» B. Unique resource locator | |
| 225. |
Cryptographic hash function takes an arbitrary block of data and returns |
| A. | fixed size bit string |
| B. | variable size bit string |
| C. | both fixed size bit string and variable size bit string |
| D. | none of the mentioned |
| Answer» B. variable size bit string | |
| 226. |
ElGamal encryption system is |
| A. | symmetric key encryption algorithm |
| B. | asymmetric key encryption algorithm |
| C. | not an encryption algorithm |
| D. | none of the mentioned |
| Answer» C. not an encryption algorithm | |
| 227. |
Voice privacy in GSM cellular telephone protocol is provided by |
| A. | A5/2 cipher |
| B. | b5/4 cipher |
| C. | b5/6 cipher |
| D. | b5/8 cipher |
| Answer» B. b5/4 cipher | |
| 228. |
Which one of the following is a cryptographic protocol used to secure HTTP connection? |
| A. | stream control transmission protocol (SCTP) |
| B. | transport layer security (TSL) |
| C. | explicit congestion notification (ECN) |
| D. | resource reservation protocol |
| Answer» C. explicit congestion notification (ECN) | |
| 229. |
Cryptanalysis is used |
| A. | to find some insecurity in a cryptographic scheme |
| B. | to increase the speed |
| C. | to encrypt the data |
| D. | none of the mentioned |
| Answer» B. to increase the speed | |
| 230. |
What is data encryption standard (DES)? |
| A. | block cipher |
| B. | stream cipher |
| C. | bit cipher |
| D. | none of the mentioned |
| Answer» B. stream cipher | |
| 231. |
In cryptography, the order of the letters in a message is rearranged by |
| A. | transpositional ciphers |
| B. | substitution ciphers |
| C. | both transpositional ciphers and substitution ciphers |
| D. | none of the mentioned |
| Answer» B. substitution ciphers | |
| 232. |
Which one of the following algorithm is not used in asymmetric-key cryptography? |
| A. | rsa algorithm |
| B. | diffie-hellman algorithm |
| C. | electronic code book algorithm |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 233. |
In asymmetric key cryptography, the private key is kept by |
| A. | sender |
| B. | receiver |
| C. | sender and receiver |
| D. | all the connected devices to the network |
| Answer» C. sender and receiver | |
| 234. |
In cryptography, what is cipher? |
| A. | algorithm for performing encryption and decryption |
| B. | encrypted message |
| C. | both algorithm for performing encryption and decryption and encrypted message |
| D. | none of the mentioned |
| Answer» B. encrypted message | |
| 235. |
Which routing protocol implements the diffusing update algorithm? |
| A. | IS-IS |
| B. | IGRP |
| C. | EIGRP |
| D. | OSPF |
| Answer» D. OSPF | |
| 236. |
Which protocol maintains neighbor adjacencies? |
| A. | RIPv2 and EIGRP |
| B. | IGRP and EIGRP |
| C. | RIPv2 |
| D. | EIGRP |
| Answer» D. EIGRP | |
| 237. |
What does administrative distance rank? |
| A. | Metrics |
| B. | Sources of routing information |
| C. | Router reliability |
| D. | Best paths |
| Answer» C. Router reliability | |
| 238. |
Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains? |
| A. | Higher cost of two routers |
| B. | Routing feedback |
| C. | Cisco IOS incompatibility |
| D. | Not possible to use two routers |
| Answer» C. Cisco IOS incompatibility | |
| 239. |
Which two routing protocols can be redistributed into OSPF by a Cisco router? |
| A. | IP EIGRP and AppleTalk EIGRP |
| B. | AppleTalk EIGRP and RIPv2 |
| C. | RIPv2 and IP EIGRP |
| D. | IPX RIP & AppleTalk EIGRP |
| Answer» D. IPX RIP & AppleTalk EIGRP | |
| 240. |
Which of the situations might not require require multiple routing protocols in a network? |
| A. | When a new Layer 2-only switch is added to the network |
| B. | When you are migrating from one routing protocol to another |
| C. | When you are using routers from multiple vendors |
| D. | When there are host-based routers from multiple vendors |
| Answer» B. When you are migrating from one routing protocol to another | |
| 241. |
Which of the following is true regarding RIPv2? |
| A. | It has a lower administrative distance than RIPv1 |
| B. | It converges faster than RIPv1 |
| C. | It has the same timers as RIPv1 |
| D. | It is harder to configure than RIPv1 |
| Answer» D. It is harder to configure than RIPv1 | |
| 242. |
What is route poisoning? |
| A. | It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted |
| B. | It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing |
| C. | It prevents regular update messages from reinstating a route that has just come up |
| D. | It describes when a router sets the metric for a downed link to infinity |
| Answer» E. | |
| 243. |
Which statement is true regarding classless routing protocols? |
| A. | The use of discontinuous networks is not allowed |
| B. | The use of variable length subnet masks is permitted |
| C. | RIPv1 is a classless routing protocol |
| D. | RIPv2 supports classless routing |
| Answer» C. RIPv1 is a classless routing protocol | |
| 244. |
Where we should use default routing |
| A. | On stub networks- which have only one exit path out of the network |
| B. | Which have more than one exit path out of the network |
| C. | Minimum five exit paths out of the network |
| D. | None of the mentioned |
| Answer» B. Which have more than one exit path out of the network | |
| 245. |
Which statement is true regarding classless routing protocol? |
| A. | The use of discontinuous networks is not allowed |
| B. | Use of variable length subnet masks is permitted |
| C. | RIPv1 is a classless routing protocol |
| D. | IGRP supports classes routing within the same autonomous system |
| Answer» C. RIPv1 is a classless routing protocol | |
| 246. |
Default administrative distance of RIP |
| A. | 0 |
| B. | 90 |
| C. | 120 |
| D. | 130 |
| Answer» D. 130 | |
| 247. |
Which protocol gives a full route table update every 30 seconds? |
| A. | IEGRP |
| B. | RIP |
| C. | both IEGRP and RIP |
| D. | none of the mentioned |
| Answer» C. both IEGRP and RIP | |
| 248. |
Default administrative distance of Static Route |
| A. | 0 |
| B. | 90 |
| C. | 100 |
| D. | 1 |
| Answer» E. | |
| 249. |
You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean? |
| A. | The route is 16 hops away Debug IP rip |
| B. | The route has a delay of 16 microseconds Debug IP route |
| C. | The route is inaccessible |
| D. | The route is queued at 16 messages a second |
| Answer» D. The route is queued at 16 messages a second | |
| 250. |
Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? |
| A. | The updated information will be added to the existing routing table Debug IP rip |
| B. | The update will be ignored and no further action will occur Debug IP route |
| C. | The updated information will replace the existing routing table entry |
| D. | The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence |
| Answer» C. The updated information will replace the existing routing table entry | |