MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A firewall needs to be so that it can grow proportionally with the network that it protects. |
| A. | robust |
| B. | expansive |
| C. | fast |
| D. | scalable |
| Answer» C. fast | |
| 2. |
Which of the following is a transport layer protocol? |
| A. | stream control transmission protocol |
| B. | internet control message protocol |
| C. | neighbor discovery protocol |
| D. | dynamic host configuration protocol |
| Answer» B. internet control message protocol | |
| 3. |
supports low energy radio operation. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | bluetooth |
| Answer» E. | |
| 4. |
A typical program obtains a remote reference to one or more remote objects on a server and then invokes methods on them. |
| A. | server |
| B. | client |
| C. | thread |
| D. | concurrent |
| Answer» C. thread | |
| 5. |
The packet sent by a node to the source to inform it of congestion is called |
| A. | explicit |
| B. | discard |
| C. | choke |
| D. | backpressure |
| Answer» D. backpressure | |
| 6. |
may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN. |
| A. | switches |
| B. | routers |
| C. | hubs |
| D. | repeaters |
| Answer» B. routers | |
| 7. |
Application layer offers service. |
| A. | end to end |
| B. | process to process |
| C. | both end to end and process to process |
| D. | none of the mentioned |
| Answer» B. process to process | |
| 8. |
As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use? |
| A. | debug ip igrp event |
| B. | debug ip igrp-events |
| C. | debug ip igrp summary |
| D. | debug ip igrp events |
| Answer» E. | |
| 9. |
enables open application layer for constrained nodes. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» C. rfid/nfc | |
| 10. |
is the multiplexing technique that shifts each signal to a different carrier frequency. |
| A. | fdm |
| B. | tdm |
| C. | both fdm & tdm |
| D. | pdm |
| Answer» B. tdm | |
| 11. |
SMTP uses which of the following TCP port? |
| A. | 22 |
| B. | 23 |
| C. | 21 |
| D. | 25 |
| Answer» E. | |
| 12. |
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to |
| A. | 1 |
| B. | 0 |
| C. | more |
| D. | -1 |
| Answer» B. 0 | |
| 13. |
is an application layer protocol for resource constrained devices. |
| A. | coap |
| B. | hmtp |
| C. | mqtt |
| D. | tcp/ip |
| Answer» B. hmtp | |
| 14. |
The port number is “ephemeral port number”, if the source host is |
| A. | ntp |
| B. | echo |
| C. | server |
| D. | client |
| Answer» E. | |
| 15. |
A typical program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects. |
| A. | server |
| B. | client |
| C. | thread |
| D. | concurrent |
| Answer» B. client | |
| 16. |
IPv6 does not use type of address. |
| A. | broadcast |
| B. | multicast |
| C. | anycast |
| D. | unicast |
| Answer» B. multicast | |
| 17. |
A is a device that forwards packets between networks by processing the routing information included in the packet. |
| A. | bridge |
| B. | firewall |
| C. | router |
| D. | hub |
| Answer» D. hub | |
| 18. |
tags, devices, smart phones useful in identification. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» D. ieee 802.15.4.lowpan | |
| 19. |
0.0.0 router IGRP 109 network 172.68.7.0 |
| A. | it isolates networks 10.0.0.0 and 172.68.7.0 |
| B. | it loads igrp for networks 109 and 71 |
| C. | it disables rip |
| D. | it disables all routing protocols |
| Answer» B. it loads igrp for networks 109 and 71 | |
| 20. |
In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics. |
| A. | ticks & hops |
| B. | hops & loops |
| C. | loops & counts |
| D. | counts & ticks |
| Answer» B. hops & loops | |
| 21. |
Which is the correct expression for the length of UDP datagram? |
| A. | udp length = ip length – ip header’s length |
| B. | udp length = udp length – udp header’s length |
| C. | udp length = ip length + ip header’s length |
| D. | udp length = udp length + udp header’s length |
| Answer» B. udp length = udp length – udp header’s length | |
| 22. |
The field is used to detect errors over the entire user datagram. |
| A. | udp header |
| B. | checksum |
| C. | source port |
| D. | destination port |
| Answer» C. source port | |
| 23. |
The field determines the lifetime of IPv6 datagram |
| A. | use dual-stack approach |
| B. | tunneling |
| C. | no solution |
| D. | replace the system |
| Answer» C. no solution | |
| 24. |
Transport services available to applications in one or another form |
| A. | reliable data transfer |
| B. | timing |
| C. | security |
| D. | all of the mentioned |
| Answer» E. | |
| 25. |
Mostly is used in wireless LAN. |
| A. | time division multiplexing |
| B. | orthogonal frequency division multiplexing |
| C. | space division multiplexing |
| D. | channel division multiplexing |
| Answer» C. space division multiplexing | |
| 26. |
Which of the following protocols is used in the internet? |
| A. | http |
| B. | dhcp |
| C. | dns |
| D. | dns, http and dns |
| Answer» E. | |
| 27. |
The physical layer translates logical communication requests from the into hardware specific operations. |
| A. | data link layer |
| B. | network layer |
| C. | trasnport layer |
| D. | application layer |
| Answer» B. network layer | |
| 28. |
Which is a time-sensitive service? |
| A. | file transfer |
| B. | file download |
| C. | |
| D. | internet telephony |
| Answer» E. | |
| 29. |
The full form of OSI is OSI model is |
| A. | open systems interconnection |
| B. | open software interconnection |
| C. | open systems internet |
| D. | open software internet |
| Answer» B. open software interconnection | |
| 30. |
In the slow-start algorithm, the size of the congestion window increases until it reaches a threshold. |
| A. | exponentially |
| B. | additively |
| C. | multiplicatively |
| D. | suddenly |
| Answer» B. additively | |
| 31. |
Simple mail transfer protocol (SMTP) utilizes as the transport layer protocol for electronic mail transfer. |
| A. | tcp |
| B. | udp |
| C. | dccp |
| D. | sctp |
| Answer» B. udp | |
| 32. |
In layer, vulnerabilities are directly associated with physical access to networks and hardware. |
| A. | physical |
| B. | data-link |
| C. | network |
| D. | application |
| Answer» B. data-link | |
| 33. |
RMI uses stub and skeleton for communication with the object. |
| A. | client |
| B. | remote |
| C. | server |
| D. | any |
| Answer» C. server | |
| 34. |
The data field cannot carry which of the following? |
| A. | tcp segment |
| B. | udp segment |
| C. | icmp messages |
| D. | smtp messages |
| Answer» D. smtp messages | |
| 35. |
What is Wired Equivalent Privacy (WEP)? |
| A. | security algorithm for ethernet |
| B. | security algorithm for wireless networks |
| C. | security algorithm for usb communication |
| D. | security algorithm for emails |
| Answer» C. security algorithm for usb communication | |
| 36. |
Which of the following is not correct in relation to multi-destination routing? |
| A. | is same as broadcast routing |
| B. | contains the list of all destinations |
| C. | data is not sent by packets |
| D. | there are multiple receivers |
| Answer» D. there are multiple receivers | |
| 37. |
Which of the following demerits does Fragmentation have? |
| A. | complicates routers |
| B. | open to dos attack |
| C. | overlapping of fragments. |
| D. | all of the mentioned |
| Answer» E. | |
| 38. |
What is the header size of a UDP packet? |
| A. | 8 bytes |
| B. | 8 bits |
| C. | 16 bytes |
| D. | 124 bytes |
| Answer» B. 8 bits | |
| 39. |
Which network topology requires a central controller or hub? |
| A. | star |
| B. | mesh |
| C. | ring |
| D. | bus |
| Answer» B. mesh | |
| 40. |
specification defining the PHY and MAC layer of low power devices. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» E. | |
| 41. |
Which of the following computer networks is built on the top of another network? |
| A. | prior network |
| B. | chief network |
| C. | prime network |
| D. | overlay network |
| Answer» E. | |
| 42. |
Which of the following routing algorithms can be used for network layer design? |
| A. | shortest path algorithm |
| B. | distance vector routing |
| C. | link state routing |
| D. | all of the mentioned |
| Answer» E. | |
| 43. |
enables seamless integration of LoWPAN devices with internet leveraging. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» B. ieft coap | |
| 44. |
Novell’s implementation of RIP updates routing tables every seconds. |
| A. | 60 |
| B. | 90 |
| C. | 10 |
| D. | 30 |
| Answer» B. 90 | |
| 45. |
The model is 7-layer architecture where each layer is having some specific functionality to perform. |
| A. | tcp/ip |
| B. | cloud |
| C. | osi |
| D. | ois |
| Answer» D. ois | |
| 46. |
What is start frame delimeter (SFD) in ethernet frame? |
| A. | 10101010 |
| B. | 10101011 |
| C. | 00000000 |
| D. | 11111111 |
| Answer» C. 00000000 | |
| 47. |
Adheres to approach for managing resources and support mapping to HTTP. |
| A. | retful |
| B. | iot |
| C. | restful |
| D. | restful |
| Answer» E. | |
| 48. |
is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
| A. | vlan attack |
| B. | vlan circumvention |
| C. | vlan compromisation method |
| D. | data-link evading |
| Answer» C. vlan compromisation method | |
| 49. |
The required resources for communication between end systems are reserved for the duration of the session between end systems in method. |
| A. | packet switching |
| B. | circuit switching |
| C. | line switching |
| D. | frequency switching |
| Answer» C. line switching | |
| 50. |
Which of the following tasks is not done by data link layer? |
| A. | framing |
| B. | error control |
| C. | flow control |
| D. | channel coding |
| Answer» E. | |