Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

The _______ field in the SNMP PDU is an offset that points to the variable in error.

A. community
B. enterprise
C. error index
D. none of the above
Answer» D. none of the above
2.

The first phase of JPEG is ___________.

A. DCT transformation
B. quantization
C. data compression
D. none of the above
Answer» B. quantization
3.

The _______ data types are atomic data types.

A. structure
B. simple
C. both a and b
D. none of the above
Answer» C. both a and b
4.

_______ is a standard to allow telephones on the public telephone network to talk to computers connected to the Internet.

A. SIP
B. H.323
C. Q.991
D. none of the above
Answer» C. Q.991
5.

In File Transfer Protocol (FTP), while the control connection is open, the data connection can be opened and closed

A. One time
B. Several Times
C. Not even Once
D. None of the given
Answer» D. None of the given
6.

Jitter is introduced in real-time data by the _______________.

A. error caused during transmission
B. delay between packets
C. both a and b
D. none of the above
Answer» C. both a and b
7.

___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.

A. Interactive
B. Streaming live
C. Streaming stored
D. none of the above
Answer» C. Streaming stored
8.

Using POP3, the e-mails are stored at .................

A. Users’ PC
B. Router
C. Gateway
D. Server
Answer» B. Router
9.

A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2-hours. The time required for the transfer is hours if synchronization is not provided.

A. 12 hours
B. 3 hours
C. Zero hours
D. Infinite
Answer» E.
10.

____________ is used to compress video.

A. MPEG
B. JPEG
C. either a or b
D. none of the above
Answer» B. JPEG
11.

At the beginning of the Internet era, the messages sent by electronic mail were short and consisted of

A. Images Only
B. Strings only
C. Text Only
D. Numbers Only
Answer» D. Numbers Only
12.

An SNMP agent can send _______ messages.

A. Response
B. GetRequest
C. SetRequest
D. none of the above
Answer» B. GetRequest
13.

____________ is used to compress images.

A. MPEG
B. JPEG
C. either a or b
D. none of the above
Answer» C. either a or b
14.

We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.

A. SMNP
B. MIB
C. SMI
D. none of the above
Answer» B. MIB
15.

The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values.

A. version
B. community
C. VarBindList
D. none of the above
Answer» D. none of the above
16.

To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.

A. ICA
B. IAC
C. AIC
D. none of the above
Answer» C. AIC
17.

RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP.

A. UDP
B. TCP
C. both a and b
D. none of the above
Answer» B. TCP
18.

___________ is a protocol for controlling the flow and quality of data.

A. RTP
B. RTCP
C. UDP
D. none of the above
Answer» C. UDP
19.

The command of End-of-File in the UNIX operating system is

A. Ctrl+E
B. Ctrl+v
C. Ctrl+u
D. Ctrl+d
Answer» E.
20.

When the sender and the receiver of an e-mail are on the same system, we need only two

A. IP
B. Domain
C. Servers
D. User Agents
Answer» E.
21.

To define the data type, SMI uses fundamental _______ definitions and adds some new definitions.

A. AMS.1
B. ASN.1
C. ASN.2
D. none of the above
Answer» C. ASN.2
22.

The chunk of information at the application layer is called

A. Packet
B. Message
C. Segment
D. Frame
Answer» C. Segment
23.

What is the port number for Gopher services?

A. 23
B. 70
C. 80
D. 71
Answer» C. 80
24.

In EMAIL, We need two VAs and two pairs of MTAs, When the sender is connected to the mail server via

A. MTA and VTA
B. LAN and WAN
C. IP and TCP
D. Host and IP
Answer» C. IP and TCP
25.

What is the port number of the SMTP ?

A. 25
B. 23
C. 20/21
D. 27960
Answer» B. 23
26.

The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest.

A. server; client
B. client; server
C. network; host
D. none of the above
Answer» B. client; server
27.

We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________.

A. SMNP
B. MIB
C. SMI
D. none of the above
Answer» C. SMI
28.

Protocol used for electronic mail?

A. TELNET
B. NNTP
C. HTTP
D. SMTP
Answer» E.
29.

If the sender wants to enable an option, it sends a _______ command.

A. WILL
B. DO
C. WONT
D. none of the above
Answer» B. DO
30.

Real-time traffic needs the support of ____________.

A. broadcasting
B. multicasting
C. both a and b
D. none of the above
Answer» C. both a and b
31.

RTP uses a temporary even-numbered _______ port.

A. UDP
B. TCP
C. both a and b
D. none of the above
Answer» B. TCP
32.

What is the port number of the HTTP ?

A. 80
B. 25
C. 23
D. 20/21
Answer» B. 25
33.

When there is more than one source, the _______ identifier defines the mixer.

A. synchronization source
B. contributor
C. timestamp
D. none of the above
Answer» B. contributor
34.

Example of command-driven user agents are

A. mail
B. pine
C. elm
D. All of them
Answer» E.
35.

A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.

A. timestamp
B. sequence number
C. translator
D. none of the above
Answer» D. none of the above
36.

The program that accepts the commands for composing, receiving and replying to messages, as well as for manipulating mail boxes is .....................

A. user agent
B. browser agent
C. message transfer agent
D. server agent
Answer» B. browser agent
37.

FTP copies a file from

A. node to node
B. one host to another
C. from servers
D. one network to other
Answer» C. from servers
38.

An RTP packet is encapsulated in _______.

A. a UDP user datagram
B. a TCP segment
C. an IP datagram
D. none of the above
Answer» B. a TCP segment
39.

A __________on each packet is required for real-time traffic.

A. timestamp
B. sequence number
C. both a and b
D. none of the above
Answer» D. none of the above
40.

TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.

A. a well-known; another well-known
B. an ephemeral; another ephemeral
C. a well-known; an ephemeral
D. none of the above
Answer» D. none of the above
41.

File Transfer Protocol (FTP), uses the well-known port 21 is used for the control connection and port 20 for the

A. Data Rate
B. Data Connection
C. Data Protocol
D. Data Congestion
Answer» C. Data Protocol
42.

The third phase of JPEG is ___________.

A. DCT transformation
B. quantization
C. data compression
D. none of the above
Answer» D. none of the above
43.

___________ is an application protocol that establishes, manages, and terminates a multimedia session.

A. RIP
B. SIP
C. DIP
D. none of the above
Answer» C. DIP
44.

When the sender and the receiver of an e-mail are on different systems, we need two VAs and a pair of

A. MTA
B. VTA
C. IP
D. TCP
Answer» B. VTA
45.

The correct syntax for accessing the telnet is

A. telnet//www.example.com
B. telnet:www.example.com
C. telnet://www.example.com
D. telnet www.example.com
Answer» D. telnet www.example.com
46.

This is an application protocol that uses the Internet's TCP/IP protocols to transfer Web page files to a server. It's also used to download programs and other files from a server to your computer.

A. FTP
B. HTTP
C. DNS
D. Telnet
Answer» B. HTTP
47.

_______ allows you to connect and login to a remote computer.

A. Telnet
B. FTP
C. HTTP
D. None of the mentioned
Answer» B. FTP
48.

Which one of the following is not correct regarding telent?

A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. none of the mentioned
Answer» D. none of the mentioned
49.

Which of the following is/are Protocols of Application layer?

A. FTP
B. DNS
C. Telnet
D. All of above
Answer» E.
50.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is

A. 5
B. 10
C. 2
D. 6
Answer» E.