Explore topic-wise MCQs in Bachelor of Sc in Information Technology.

This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Sc in Information Technology knowledge and support exam preparation. Choose a topic below to get started.

1.

The ESP provides

A. Source authentication
B. Data integrity
C. Privacy
D. All of them
Answer» E.
2.

One of the protocols to provide security at the application layer is

A. Pretty Good Privacy
B. Handshake Protocol
C. Alert Protocol
D. Record Protocol
Answer» B. Handshake Protocol
3.

The SSL divides the data into blocks of

A. 2*6
B. 2*14
C. 2*20
D. 2*24
Answer» C. 2*20
4.

The AH Protocol provides source authentication and data integrity, but not

A. Integrity
B. Privacy
C. Nonrepudiation
D. Both a and c
Answer» C. Nonrepudiation
5.

A proxy firewall filters at the

A. Physical layer
B. Application layer
C. Data link layer
D. Network layer
Answer» C. Data link layer
6.

A packet.filter firewall filters at the

A. Application or transport
B. Data link layer
C. Physical Layer
D. Network or transport layer
Answer» E.
7.

The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.

A. limited
B. vast
C. distributed
D. none of the above
Answer» D. none of the above
8.

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

A. request; response
B. response; request
C. response; status
D. none of the above
Answer» E.
9.

HTTP version 1.1 specifies a _________connection by default.

A. persistent
B. nonpersistent
C. both a and b
D. none of the above
Answer» B. nonpersistent
10.

In a URL, the _______ is the full name of the file where the information is located.

A. path
B. protocol
C. host
D. none of the above
Answer» B. protocol
11.

In a ___________ connection, one TCP connection is made for each request/response.

A. persistent
B. nonpersistent
C. both a and b
D. none of the above
Answer» C. both a and b
12.

In a URL, the ______ is the computer on which the information is located.

A. path
B. protocol
C. host
D. none of the above
Answer» D. none of the above
13.

An HTTP request message always contains _______.

A. a header and a body
B. a request line and a header
C. a status line, a header, and a body
D. one of the above
Answer» C. a status line, a header, and a body
14.

In a ___________connection, the server leaves the connection open for more requests after sending a response.

A. persistent
B. nonpersistent
C. both a and b
D. none of the above
Answer» B. nonpersistent
15.

The HTTP request line contains a _______ method to request a document from the server.

A. get
B. post
C. copy
D. none of the above
Answer» B. post
16.

___________ is a technology that creates and handles dynamic documents.

A. gic
B. cgi
C. gci
D. none of the above
Answer» C. gci
17.

_____________ is a language for creating Web pages.

A. http
B. html
C. fttp
D. none of the above
Answer» C. fttp
18.

The documents in the WWW can be grouped into ______ broad categories.

A. two
B. three
C. four
D. none of the above
Answer» C. four
19.

An applet is _______ document application program.

A. a static
B. an active
C. a passive
D. a dynamic
Answer» C. a passive
20.

In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.

A. path
B. protocol
C. host
D. none of the above
Answer» E.
21.

A response message always contains _______.

A. a header and a body
B. a request line and a header
C. a status line and a header
D. none of the above
Answer» D. none of the above
22.

The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.

A. head
B. post
C. copy
D. none of the above
Answer» B. post
23.

In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.

A. regular
B. proxy
C. both a and b
D. none of the above
Answer» C. both a and b
24.

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

A. static
B. dynamic
C. active
D. none of the above
Answer» D. none of the above
25.

Dynamic documents are sometimes referred to as _________ dynamic documents.

A. client-site
B. server-site
C. both a and b
D. none of the above
Answer» C. both a and b
26.

HTTP uses the services of _________ on well-known port 80.

A. udp
B. ip
C. tcp
D. none of the above
Answer» D. none of the above
27.

Active documents are sometimes referred to as _________ dynamic documents.

A. client-site
B. server-site
C. both a and b
D. none of the above
Answer» B. server-site
28.

Which of the following is present in both an HTTP request line and a status line?

A. http version number
B. url
C. status code
D. none of the above
Answer» B. url
29.

_________ is a repository of information linked together from points all over the world.

A. the www
B. http
C. html
D. none of the above
Answer» B. http
30.

The _________ is a standard for specifying any kind of information on the Internet.

A. url
B. ulr
C. rlu
D. none of the above
Answer» B. ulr
31.

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

A. static
B. dynamic
C. active
D. none of the above
Answer» B. dynamic
32.

A cookie is made by the ________ and eaten by the _________.

A. client; client
B. client; server
C. server; server
D. none of the above
Answer» D. none of the above
33.

One way to create an active document is to use __________.

A. cgi
B. java stand-alone programs
C. java applets
D. none of the above
Answer» D. none of the above
34.

A _______ document is created by a Web server whenever a browser requests the document.

A. static
B. dynamic
C. active
D. none of the above
Answer» C. active
35.

In a URL, the _______ is the client-server program used to retrieve the document.

A. path
B. protocol
C. host
D. none of the above
Answer» C. host
36.

A user needs to send the server some information. The request line method is _______.

A. option
B. patch
C. post
D. none of the above
Answer» D. none of the above
37.

In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

A. secret
B. public
C. either (a) or (b)
D. both (a) and (b)
Answer» C. either (a) or (b)
38.

A _______ layer security protocol provides end-to-end security services for applications.

A. data link
B. network
C. transport
D. none of the above
Answer» D. none of the above
39.

_______ provide security at the transport layer.

A. ssl
B. tls
C. either (a) or (b)
D. both (a) and (b)
Answer» E.
40.

______ is designed to provide security and compression services to data generated from the application layer.

A. ssl
B. tls
C. either (a) or (b)
D. both (a) and (b)
Answer» E.
41.

IPSec in the ______ mode does not protect the IP header.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. tunnel
42.

A ______ provides privacy for LANs that must communicate through the global Internet.

A. vpp
B. vnp
C. vnn
D. vpn
Answer» E.
43.

The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

A. list of protocols
B. cipher suite
C. list of keys
D. none of the above
Answer» C. list of keys
44.

______ is actually an IETF version of _____.

A. tls; tss
B. ssl; tls
C. tls; ssl
D. ssl; slt
Answer» D. ssl; slt
45.

An ________ is a private network that uses the Internet model.

A. intranet
B. internet
C. extranet
D. none of the above
Answer» B. internet
46.

IPSec uses a set of SAs called the ________.

A. sad
B. sab
C. sadb
D. none of the above
Answer» D. none of the above
47.

IKE uses _______.

A. oakley
B. skeme
C. isakmp
D. all of the above
Answer» E.
48.

_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» B. ssl
49.

An _________ is a network that allows authorized access from outside users.

A. intranet
B. internet
C. extranet
D. none of the above
Answer» D. none of the above
50.

The Internet authorities have reserved addresses for _______.

A. intranets
B. internets
C. extranets
D. none of the above
Answer» E.