Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

A firewall needs to be                      so that it can grow proportionally with the network that it protects.

A. robust
B. expansive
C. fast
D. scalable
Answer» C. fast
2.

Which of the following is a transport layer protocol?

A. stream control transmission protocol
B. internet control message protocol
C. neighbor discovery protocol
D. dynamic host configuration protocol
Answer» B. internet control message protocol
3.

supports low energy radio operation.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. bluetooth
Answer» E.
4.

A typical                      program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.

A. server
B. client
C. thread
D. concurrent
Answer» C. thread
5.

The packet sent by a node to the source to inform it of congestion is called

A. explicit
B. discard
C. choke
D. backpressure
Answer» D. backpressure
6.

may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A. switches
B. routers
C. hubs
D. repeaters
Answer» B. routers
7.

Application layer offers                service.

A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Answer» B. process to process
8.

As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?

A. debug ip igrp event
B. debug ip igrp-events
C. debug ip igrp summary
D. debug ip igrp events
Answer» E.
9.

enables open application layer for constrained nodes.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» C. rfid/nfc
10.

is the multiplexing technique that shifts each signal to a different carrier frequency.

A. fdm
B. tdm
C. both fdm & tdm
D. pdm
Answer» B. tdm
11.

SMTP uses which of the following TCP port?

A. 22
B. 23
C. 21
D. 25
Answer» E.
12.

In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to

A. 1
B. 0
C. more
D. -1
Answer» B. 0
13.

is an application layer protocol for resource constrained devices.

A. coap
B. hmtp
C. mqtt
D. tcp/ip
Answer» B. hmtp
14.

The port number is “ephemeral port number”, if the source host is

A. ntp
B. echo
C. server
D. client
Answer» E.
15.

A typical                    program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.

A. server
B. client
C. thread
D. concurrent
Answer» B. client
16.

IPv6 does not use                    type of address.

A. broadcast
B. multicast
C. anycast
D. unicast
Answer» B. multicast
17.

A                      is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. hub
Answer» D. hub
18.

tags, devices, smart phones useful in identification.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» D. ieee 802.15.4.lowpan
19.

0.0.0 router IGRP 109 network 172.68.7.0

A. it isolates networks 10.0.0.0 and 172.68.7.0
B. it loads igrp for networks 109 and 71
C. it disables rip
D. it disables all routing protocols
Answer» B. it loads igrp for networks 109 and 71
20.

In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.

A. ticks & hops
B. hops & loops
C. loops & counts
D. counts & ticks
Answer» B. hops & loops
21.

Which is the correct expression for the length of UDP datagram?

A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» B. udp length = udp length – udp header’s length
22.

The              field is used to detect errors over the entire user datagram.

A. udp header
B. checksum
C. source port
D. destination port
Answer» C. source port
23.

The                    field determines the lifetime of IPv6 datagram

A. use dual-stack approach
B. tunneling
C. no solution
D. replace the system
Answer» C. no solution
24.

Transport services available to applications in one or another form

A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» E.
25.

Mostly                  is used in wireless LAN.

A. time division multiplexing
B. orthogonal frequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» C. space division multiplexing
26.

Which of the following protocols is used in the internet?

A. http
B. dhcp
C. dns
D. dns, http and dns
Answer» E.
27.

The physical layer translates logical communication requests from the              into hardware specific operations.

A. data link layer
B. network layer
C. trasnport layer
D. application layer
Answer» B. network layer
28.

Which is a time-sensitive service?

A. file transfer
B. file download
C. e-mail
D. internet telephony
Answer» E.
29.

The full form of OSI is OSI model is

A. open systems interconnection
B. open software interconnection
C. open systems internet
D. open software internet
Answer» B. open software interconnection
30.

In the slow-start algorithm, the size of the congestion window increases                       until it reaches a threshold.

A. exponentially
B. additively
C. multiplicatively
D. suddenly
Answer» B. additively
31.

Simple mail transfer protocol (SMTP) utilizes                    as the transport layer protocol for electronic mail transfer.

A. tcp
B. udp
C. dccp
D. sctp
Answer» B. udp
32.

In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» B. data-link
33.

RMI uses stub and skeleton for communication with the                  object.

A. client
B. remote
C. server
D. any
Answer» C. server
34.

The data field cannot carry which of the following?

A. tcp segment
B. udp segment
C. icmp messages
D. smtp messages
Answer» D. smtp messages
35.

What is Wired Equivalent Privacy (WEP)?

A. security algorithm for ethernet
B. security algorithm for wireless networks
C. security algorithm for usb communication
D. security algorithm for emails
Answer» C. security algorithm for usb communication
36.

Which of the following is not correct in relation to multi-destination routing?

A. is same as broadcast routing
B. contains the list of all destinations
C. data is not sent by packets
D. there are multiple receivers
Answer» D. there are multiple receivers
37.

Which of the following demerits does Fragmentation have?

A. complicates routers
B. open to dos attack
C. overlapping of fragments.
D. all of the mentioned
Answer» E.
38.

What is the header size of a UDP packet?

A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» B. 8 bits
39.

Which network topology requires a central controller or hub?

A. star
B. mesh
C. ring
D. bus
Answer» B. mesh
40.

specification defining the PHY and MAC layer of low power devices.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» E.
41.

Which of the following computer networks is built on the top of another network?

A. prior network
B. chief network
C. prime network
D. overlay network
Answer» E.
42.

Which of the following routing algorithms can be used for network layer design?

A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» E.
43.

enables seamless integration of LoWPAN devices with internet leveraging.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» B. ieft coap
44.

Novell’s implementation of RIP updates routing tables every                    seconds.

A. 60
B. 90
C. 10
D. 30
Answer» B. 90
45.

The                          model is 7-layer architecture where each layer is having some specific functionality to perform.

A. tcp/ip
B. cloud
C. osi
D. ois
Answer» D. ois
46.

What is start frame delimeter (SFD) in ethernet frame?

A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer» C. 00000000
47.

Adheres to                  approach for managing resources and support mapping to HTTP.

A. retful
B. iot
C. restful
D. restful
Answer» E.
48.

is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A. vlan attack
B. vlan circumvention
C. vlan compromisation method
D. data-link evading
Answer» C. vlan compromisation method
49.

The required resources for communication between end systems are reserved for the duration of the session between end systems in                  method.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» C. line switching
50.

Which of the following tasks is not done by data link layer?

A. framing
B. error control
C. flow control
D. channel coding
Answer» E.