MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 401. |
The size of an IP address in IPv6 is _________ |
| A. | 32 bits |
| B. | 64 bits |
| C. | 128 bits |
| D. | 265 bits |
| Answer» D. 265 bits | |
| 402. |
Which of the following below is/are the capability of ICMP protocol? |
| A. | Report package count |
| B. | Report network congestion |
| C. | Both band d |
| D. | Report availability of remote hosts |
| Answer» D. Report availability of remote hosts | |
| 403. |
What is the difference between ring and bustopology? |
| A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
| B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
| C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode |
| D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
| Answer» B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable | |
| 404. |
An alternative to JavaScript on windows platform is _______ |
| A. | vbscript |
| B. | asp.net |
| C. | jsp |
| D. | php |
| Answer» B. asp.net | |
| 405. |
A stream socket provides _________ communications between a client and a server |
| A. | One way |
| B. | Two way |
| Answer» C. | |
| 406. |
ONT is connected to splitter using _________ |
| A. | high speed fibre cable |
| B. | hfc |
| C. | optical cable |
| D. | twisted pair cable |
| Answer» D. twisted pair cable | |
| 407. |
WiMAX uses the _________ |
| A. | orthogonal frequency division multiplexing |
| B. | time division multiplexing |
| C. | space division multiplexing |
| D. | channel division multiplexing |
| Answer» B. time division multiplexing | |
| 408. |
IPv6 does not use ________ type of address. |
| A. | broadcast |
| B. | multicast |
| C. | any cast |
| D. | unicast |
| Answer» B. multicast | |
| 409. |
In IPv6 addresses, addresses that start with eight 0s are called ________ |
| A. | unicast addresses |
| B. | multicast addresses |
| C. | any cast addresses |
| D. | reserved addresses |
| Answer» E. | |
| 410. |
The decimal code of Interpret as Command (IAC) character is _______ |
| A. | 252 |
| B. | 253 |
| C. | 254 |
| D. | 255 |
| Answer» E. | |
| 411. |
The combination of an IP address and a port number is known as. |
| A. | network number |
| B. | socket address |
| C. | subnet mask number |
| D. | MAC address |
| Answer» C. subnet mask number | |
| 412. |
RTP is used to ________ |
| A. | carry the media stream |
| B. | monitor transmission statistics of streams |
| C. | monitor quality of service of streams |
| D. | secure the stream |
| Answer» B. monitor transmission statistics of streams | |
| 413. |
Which of the following is reliable communication? |
| A. | TCP |
| B. | IP |
| C. | UPD |
| D. | All of them |
| Answer» B. IP | |
| 414. |
Which methods are commonly used in Server Socket class? |
| A. | public output stream get output stream () |
| B. | public socket accept () |
| C. | public synchronized void close () |
| D. | public void connect () |
| Answer» C. public synchronized void close () | |
| 415. |
An interconnected collection of piconet is called ___________ |
| A. | scatternet |
| B. | micronet |
| C. | mininet |
| D. | multinet |
| Answer» B. micronet | |
| 416. |
RPC is a _________ |
| A. | synchronous operation |
| B. | asynchronous operation |
| C. | time independent operation |
| D. | channel specific operation |
| Answer» B. asynchronous operation | |
| 417. |
Sending a file from your personal computer's primary memory or disk toanother computer is called |
| A. | uploading |
| B. | downloading |
| C. | logging on |
| D. | hangs on |
| Answer» B. downloading | |
| 418. |
Which address is used on the internet for employing the TCP/IP protocols? |
| A. | physical address and logical address |
| B. | port address |
| C. | specific address |
| D. | all of the mentioned |
| Answer» E. | |
| 419. |
WPA2 is used for security in _______ |
| A. | ethernet |
| B. | bluetooth |
| C. | wi-fi |
| D. | |
| Answer» D. e-mail | |
| 420. |
To join the internet, the computer has to be connected to a _________ |
| A. | internet architecture board |
| B. | internet society |
| C. | internet service provider |
| D. | different computer |
| Answer» D. different computer | |
| 421. |
In IPv4 Addresses, classful addressing is replaced with ________ |
| A. | classless addressing |
| B. | classful addressing |
| C. | classful advertising |
| D. | classless advertising |
| Answer» B. classful addressing | |
| 422. |
A packet filter firewall filters at __________ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer or transport layer |
| D. | application layer |
| Answer» D. application layer | |
| 423. |
Which of the following is a form of DoS attack? |
| A. | vulnerability attack |
| B. | bandwidth flooding |
| C. | connection flooding |
| D. | all of the mentioned |
| Answer» E. | |
| 424. |
Virtual circuit identifier in frame relay is called ______ |
| A. | data link connection identifier |
| B. | frame relay identifier |
| C. | cell relay identifier |
| D. | circuit connection identifier |
| Answer» B. frame relay identifier | |
| 425. |
What is the difference between ring and bus topology? |
| A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
| B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
| C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a central node |
| D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
| Answer» B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable | |
| 426. |
A proxy firewall filters at _________ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | application layer |
| Answer» E. | |
| 427. |
Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browserWhich is the applicable level protocol user in each activity? |
| A. | m1:HTTP, m2:SMTP, m3:POP |
| B. | m1:SMTP, m2:FTP, m3:HTTP |
| C. | m1:SMTP, m2:POP, m3:HTTP |
| D. | m1:POP, m2:SMTP, m3:IMAP |
| Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
| 428. |
_______ assigns a unique number to each IP network adapter called the MAC address. |
| A. | Media Access Control |
| B. | Metro Access Control |
| C. | Metropolitan Access Control |
| D. | Both B and C above |
| Answer» B. Metro Access Control | |
| 429. |
A stream socket provides communications between a client and a server |
| A. | One way |
| B. | Two way |
| C. | none |
| D. | other |
| Answer» C. none | |
| 430. |
When displaying a web page, the application layer uses the: |
| A. | HTTP protocol |
| B. | FTP protocol |
| C. | SMTP protocol |
| D. | none of the mentioned |
| Answer» B. FTP protocol | |
| 431. |
Multiple processes on destinations at transport layer are identified by __________ |
| A. | mac address |
| B. | port number |
| C. | host number |
| D. | host address |
| Answer» C. host number | |
| 432. |
Next-Hop Method is used to reduce contents of a _________ |
| A. | revolving table |
| B. | rotating table |
| C. | routing table |
| D. | re-allocate table |
| Answer» D. re-allocate table | |
| 433. |
In frame relay networks, extended address is used _______ |
| A. | to increase the range of data link connection identifiers |
| B. | for error detection |
| C. | for encryption |
| D. | for error recovery |
| Answer» B. for error detection | |
| 434. |
During error reporting, ICMP always reports error messages to ________ |
| A. | destination |
| B. | source |
| C. | next router |
| D. | previous router |
| Answer» C. next router | |
| 435. |
What is the max length of the Shielded twisted pair cable? |
| A. | 100 ft |
| B. | 200 ft |
| C. | 100 m |
| D. | 200 m |
| Answer» D. 200 m | |
| 436. |
FTP server _____________ |
| A. | maintains state information |
| B. | is stateless |
| C. | has single tcp connection for a file transfer |
| D. | has udp connection for file transfer |
| Answer» B. is stateless | |
| 437. |
Ping sweep is a part of _________ |
| A. | traceroute |
| B. | nmap |
| C. | route |
| D. | ipconfig |
| Answer» C. route | |
| 438. |
Structure of Management Information (SMI), is the guideline of ________ |
| A. | http |
| B. | snmp |
| C. | url |
| D. | mib |
| Answer» C. url | |
| 439. |
The first Network was called |
| A. | CNNET |
| B. | NSFNET |
| C. | ASAPNET |
| D. | ARPANET |
| Answer» E. | |
| 440. |
IP4 is more commonly used than IPv6? |
| A. | True |
| B. | False |
| C. | none |
| D. | other |
| Answer» B. False | |
| 441. |
Transport layer protocols deals with ____________ |
| A. | application to application communication |
| B. | process to process communication |
| C. | node to node communication |
| D. | man to man communication |
| Answer» C. node to node communication | |
| 442. |
Which of the following is true for secure shell tunneling? |
| A. | To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
| B. | SSH tunnels provide a means to not bypassfirewalls |
| C. | All SSH clients support dynamic port forwarding |
| D. | Both A and B |
| Answer» B. SSH tunnels provide a means to not bypassfirewalls | |
| 443. |
The application layer protocol used by a Telnet application is ________ |
| A. | telnet |
| B. | ftp |
| C. | http |
| D. | smtp |
| Answer» B. ftp | |
| 444. |
Network layer firewall has two sub-categories called ____________ |
| A. | stateful firewall and stateless firewall |
| B. | bit oriented firewall and byte oriented firewall |
| C. | frame firewall and packet firewall |
| D. | network firewall and data firewall |
| Answer» B. bit oriented firewall and byte oriented firewall | |
| 445. |
Which of the following is not related to ipconfig in Microsoft Windows? |
| A. | display all current tcp/ip network configuration values |
| B. | modify dhcp settings |
| C. | modify dns settings |
| D. | trace the routers in the path to destination |
| Answer» E. | |
| 446. |
BER stands for ________ |
| A. | basic encoding rules |
| B. | basic encoding resolver |
| C. | basic encoding rotator |
| D. | basic encoding router |
| Answer» B. basic encoding resolver | |
| 447. |
Which of the following is an example of user agents for e-mail? |
| A. | microsoft outlook |
| B. | |
| C. | |
| D. | tumblr |
| Answer» B. facebook | |
| 448. |
Both ping and tracert are used to find If the computer is in the network. |
| A. | True |
| B. | False |
| C. | none |
| D. | other |
| Answer» C. none | |
| 449. |
In an IPv6 header, the traffic class field is similar to which field in the IPv4 header? |
| A. | fragmentation field |
| B. | fast switching |
| C. | tos field |
| D. | option field |
| Answer» D. option field | |
| 450. |
Beyond IP, UDP provides additional services such as _______ |
| A. | routing and switching |
| B. | sending and receiving of packets |
| C. | multiplexing and demultiplexing |
| D. | demultiplexing and error checking |
| Answer» E. | |