MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
RPF stands for |
| A. | reverse path forwarding |
| B. | reverse path failure |
| C. | reverse packet forwarding |
| D. | reverse protocol failure |
| Answer» B. reverse path failure | |
| 52. |
Which of the following is a data link protocol? |
| A. | ethernet |
| B. | point to point protocol |
| C. | hdlc |
| D. | all of the mentioned |
| Answer» E. | |
| 53. |
Which of the following is false with respect to TCP? |
| A. | connection-oriented |
| B. | process-to-process |
| C. | transport layer protocol |
| D. | unreliable |
| Answer» E. | |
| 54. |
Which of the following is not an application layer service? |
| A. | network virtual terminal |
| B. | file transfer, access, and management |
| C. | mail service |
| D. | error control |
| Answer» E. | |
| 55. |
topology requires a multipoint connection. |
| A. | star |
| B. | mesh |
| C. | ring |
| D. | bus |
| Answer» E. | |
| 56. |
As the resources are reserved between two communicating end systems in circuit switching, is achieved. |
| A. | authentication |
| B. | guaranteed constant rate |
| C. | reliability |
| D. | store and forward |
| Answer» C. reliability | |
| 57. |
The layer, which provides the interface that client and server application objects use to interact with each other. |
| A. | increasing |
| B. | count |
| C. | bit |
| D. | stub/skeleton |
| Answer» E. | |
| 58. |
What is the main advantage of UDP? |
| A. | more overload |
| B. | reliable |
| C. | low overhead |
| D. | fast |
| Answer» D. fast | |
| 59. |
Which NetWare protocol works on layer 3– network layer—of the OSI model? |
| A. | ipx |
| B. | ncp |
| C. | spx |
| D. | netbios |
| Answer» B. ncp | |
| 60. |
In systems, resources are allocated on demand. |
| A. | packet switching |
| B. | circuit switching |
| C. | line switching |
| D. | frequency switching |
| Answer» B. circuit switching | |
| 61. |
resources are identified by Uniform Resource Identifiers. |
| A. | coap |
| B. | hmtp |
| C. | mqtt |
| D. | tcp/ip |
| Answer» B. hmtp | |
| 62. |
A firewall needs to be                      so that it can grow proportionally with the network that it protects. |
| A. | robust |
| B. | expansive |
| C. | fast |
| D. | scalable |
| Answer» C. fast | |
| 63. |
A packet filter firewall filters at |
| A. | physical layer |
| B. | data link layer |
| C. | network layer or transport layer |
| D. | application layer |
| Answer» D. application layer | |
| 64. |
A proxy firewall filters at |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | application layer |
| Answer» E. | |
| 65. |
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as |
| A. | chock point |
| B. | meeting point |
| C. | firewall point |
| D. | secure point |
| Answer» B. meeting point | |
| 66. |
Network layer firewall has two sub- categories as |
| A. | state full firewall and stateless firewall |
| B. | bit oriented firewall and byte oriented firewall |
| C. | frame firewall and packet firewall |
| D. | network layer firewall and session layer firewall |
| Answer» B. bit oriented firewall and byte oriented firewall | |
| 67. |
Network layer firewall works as a |
| A. | frame filter |
| B. | packet filter |
| C. | content filter |
| D. | virus filter |
| Answer» C. content filter | |
| 68. |
The client_key_exchange message uses a pre master key of size – |
| A. | 48 bytes |
| B. | 56 bytes |
| C. | 64 bytes |
| D. | 32 bytes |
| Answer» B. 56 bytes | |
| 69. |
The RSA signature uses which hash algorithm? |
| A. | md5 |
| B. | sha-1 |
| C. | md5 and sha-1 |
| D. | none of the mentioned. |
| Answer» D. none of the mentioned. | |
| 70. |
The certificate_request massage includes two parameters, one of which is- |
| A. | certificate_extension |
| B. | certificate_creation |
| C. | certificate_exchange |
| D. | certificate_type |
| Answer» E. | |
| 71. |
In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems? |
| A. | fortezza |
| B. | anonymous diffie-hellman |
| C. | fixed diffie-hellman |
| D. | rsa |
| Answer» D. rsa | |
| 72. |
The certificate message is required for any agreed-on key exchange method except |
| A. | ephemeral diffie-hellman |
| B. | anonymous diffie-hellman |
| C. | fixed diffie-hellman |
| D. | rsa |
| Answer» C. fixed diffie-hellman | |
| 73. |
Which is the key exchange algorithm used in CipherSuite parameter? |
| A. | rsa |
| B. | fixed diffie-hellman |
| C. | ephemeral diffie-hellman |
| D. | any of the mentioned |
| Answer» E. | |
| 74. |
In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange? |
| A. | server_done |
| B. | server_key_exchange |
| C. | certificate_request |
| D. | crtificate_verify |
| Answer» B. server_key_exchange | |
| 75. |
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as |
| A. | delivery of packets |
| B. | error correction |
| C. | multiplexing |
| D. | demultiplexing |
| Answer» E. | |
| 76. |
In the SSL record protocol operation pad_1 is – |
| A. | is the byte 0x36 repeated 40 times for md5 |
| B. | is the byte 0x5c repeated 40 times for md5 |
| C. | is the byte 0x5c repeated 48 times for sha-1 |
| D. | is the byte 0x36 repeated 48 times for md5 |
| Answer» E. | |
| 77. |
In the SSL record protocol operation pad_2 is – |
| A. | is the byte 0x36 repeated 40 times for md5 |
| B. | is the byte 0x5c repeated 48 times for md5 |
| C. | is the byte 0x5c repeated 48 times for sha-1 |
| D. | is the byte 0x36 repeated 48 times for md5 |
| Answer» C. is the byte 0x5c repeated 48 times for sha-1 | |
| 78. |
Number of phases in the handshaking protocol? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 79. |
Which of the following is false with respect to Connectionless service of transport layer protocol? |
| A. | packets are not numbered |
| B. | packets are not delayed |
| C. | no acknowledgement |
| D. | packet may arrive out of sequence |
| Answer» C. no acknowledgement | |
| 80. |
In transport layer, Multiplexing is done at |
| A. | channel |
| B. | receiver site |
| C. | sender site |
| D. | packet |
| Answer» D. packet | |
| 81. |
The combination of an IP address and port number is called as |
| A. | socket address |
| B. | port address |
| C. | mac address |
| D. | host address |
| Answer» B. port address | |
| 82. |
Multiple processes on destinations at transport layer are identified by |
| A. | mac address |
| B. | port number |
| C. | host number |
| D. | host address |
| Answer» C. host number | |
| 83. |
According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges? |
| A. | well-known ports |
| B. | registered ports |
| C. | dynamic ports |
| D. | static ports |
| Answer» E. | |
| 84. |
Which layer is responsible for process-to- process delivery? |
| A. | physical layer |
| B. | network layer |
| C. | transport layer |
| D. | application layer |
| Answer» D. application layer | |
| 85. |
An SMTP session may not include |
| A. | zero smtp transaction |
| B. | one smtp transaction |
| C. | more than one smtp transaction |
| D. | one http transaction |
| Answer» E. | |
| 86. |
6 INTRODUCTION TO PEER TO PEER NETWORKS |
| A. | client/server |
| B. | source/destination |
| C. | message transfer |
| D. | peer to peer |
| Answer» B. source/destination | |
| 87. |
SMTP defines |
| A. | message transport |
| B. | message encryption |
| C. | message content |
| D. | message password |
| Answer» B. message encryption | |
| 88. |
SMTP connections secured by SSL are known as |
| A. | smtps |
| B. | ssmtp |
| C. | snmp |
| D. | starttls |
| Answer» B. ssmtp | |
| 89. |
Simple mail transfer protocol (SMTP) utilizes                    as the transport layer protocol for electronic mail transfer. |
| A. | tcp |
| B. | udp |
| C. | dccp |
| D. | sctp |
| Answer» B. udp | |
| 90. |
The domain name system is maintained by |
| A. | distributed database system |
| B. | a single server |
| C. | a single computer |
| D. | none of the mentioned |
| Answer» B. a single server | |
| 91. |
The right to use a domain name is delegated by domain name registers which are accredited by |
| A. | internet architecture board |
| B. | internet society |
| C. | internet research task force |
| D. | internet corporation for assigned names and numbers |
| Answer» E. | |
| 92. |
DNS database contains |
| A. | name server records |
| B. | hostname-to-address records |
| C. | hostname aliases |
| D. | all of the mentioned |
| Answer» E. | |
| 93. |
Wildcard domain names start with label |
| A. | @ |
| B. | * |
| C. | & |
| D. | # |
| Answer» C. & | |
| 94. |
Which one of the following allows client to update their DNS entry as their IP address change? |
| A. | dynamic dns |
| B. | mail transfer agent |
| C. | authoritative name server |
| D. | none of the mentioned |
| Answer» B. mail transfer agent | |
| 95. |
If a server has no clue about where to find the address for a hostname then |
| A. | server asks to the root server |
| B. | server asks to its adjcent server |
| C. | request is not processed |
| D. | none of the mentioned |
| Answer» B. server asks to its adjcent server | |
| 96. |
A DNS client is called |
| A. | dns updater |
| B. | dns resolver |
| C. | dns handler |
| D. | none of the mentioned |
| Answer» C. dns handler | |
| 97. |
An alternative to JavaScript on windows platform is |
| A. | vbscript |
| B. | asp.net |
| C. | jsp |
| D. | php |
| Answer» B. asp.net | |
| 98. |
AJAX stands for |
| A. | asynchronous javascript and xml |
| B. | advanced jsp and xml |
| C. | asynchronous jsp and xml |
| D. | advanced javascript and xml |
| Answer» B. advanced jsp and xml | |
| 99. |
A web cookie is a small piece of data that is |
| A. | sent from a website and stored in user’s web browser while a user is browsing a website |
| B. | sent from user and stored in the server while a user is browsing a website |
| C. | sent from root server to all servers |
| D. | sent from the root server to other root servers |
| Answer» B. sent from user and stored in the server while a user is browsing a website | |
| 100. |
Common gateway interface is used to |
| A. | generate executable files from web content by web server |
| B. | generate web pages |
| C. | stream videos |
| D. | download media files |
| Answer» B. generate web pages | |