

MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
1. |
A firewall needs to be so that it can grow proportionally with the network that it protects. |
A. | robust |
B. | expansive |
C. | fast |
D. | scalable |
Answer» C. fast | |
2. |
Which of the following is a transport layer protocol? |
A. | stream control transmission protocol |
B. | internet control message protocol |
C. | neighbor discovery protocol |
D. | dynamic host configuration protocol |
Answer» B. internet control message protocol | |
3. |
supports low energy radio operation. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | bluetooth |
Answer» E. | |
4. |
A typical program obtains a remote reference to one or more remote objects on a server and then invokes methods on them. |
A. | server |
B. | client |
C. | thread |
D. | concurrent |
Answer» C. thread | |
5. |
The packet sent by a node to the source to inform it of congestion is called |
A. | explicit |
B. | discard |
C. | choke |
D. | backpressure |
Answer» D. backpressure | |
6. |
may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN. |
A. | switches |
B. | routers |
C. | hubs |
D. | repeaters |
Answer» B. routers | |
7. |
Application layer offers service. |
A. | end to end |
B. | process to process |
C. | both end to end and process to process |
D. | none of the mentioned |
Answer» B. process to process | |
8. |
As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use? |
A. | debug ip igrp event |
B. | debug ip igrp-events |
C. | debug ip igrp summary |
D. | debug ip igrp events |
Answer» E. | |
9. |
enables open application layer for constrained nodes. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» C. rfid/nfc | |
10. |
is the multiplexing technique that shifts each signal to a different carrier frequency. |
A. | fdm |
B. | tdm |
C. | both fdm & tdm |
D. | pdm |
Answer» B. tdm | |
11. |
SMTP uses which of the following TCP port? |
A. | 22 |
B. | 23 |
C. | 21 |
D. | 25 |
Answer» E. | |
12. |
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to |
A. | 1 |
B. | 0 |
C. | more |
D. | -1 |
Answer» B. 0 | |
13. |
is an application layer protocol for resource constrained devices. |
A. | coap |
B. | hmtp |
C. | mqtt |
D. | tcp/ip |
Answer» B. hmtp | |
14. |
The port number is “ephemeral port number”, if the source host is |
A. | ntp |
B. | echo |
C. | server |
D. | client |
Answer» E. | |
15. |
A typical program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects. |
A. | server |
B. | client |
C. | thread |
D. | concurrent |
Answer» B. client | |
16. |
IPv6 does not use type of address. |
A. | broadcast |
B. | multicast |
C. | anycast |
D. | unicast |
Answer» B. multicast | |
17. |
A is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | bridge |
B. | firewall |
C. | router |
D. | hub |
Answer» D. hub | |
18. |
tags, devices, smart phones useful in identification. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» D. ieee 802.15.4.lowpan | |
19. |
0.0.0 router IGRP 109 network 172.68.7.0 |
A. | it isolates networks 10.0.0.0 and 172.68.7.0 |
B. | it loads igrp for networks 109 and 71 |
C. | it disables rip |
D. | it disables all routing protocols |
Answer» B. it loads igrp for networks 109 and 71 | |
20. |
In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics. |
A. | ticks & hops |
B. | hops & loops |
C. | loops & counts |
D. | counts & ticks |
Answer» B. hops & loops | |
21. |
Which is the correct expression for the length of UDP datagram? |
A. | udp length = ip length – ip header’s length |
B. | udp length = udp length – udp header’s length |
C. | udp length = ip length + ip header’s length |
D. | udp length = udp length + udp header’s length |
Answer» B. udp length = udp length – udp header’s length | |
22. |
The field is used to detect errors over the entire user datagram. |
A. | udp header |
B. | checksum |
C. | source port |
D. | destination port |
Answer» C. source port | |
23. |
The field determines the lifetime of IPv6 datagram |
A. | use dual-stack approach |
B. | tunneling |
C. | no solution |
D. | replace the system |
Answer» C. no solution | |
24. |
Transport services available to applications in one or another form |
A. | reliable data transfer |
B. | timing |
C. | security |
D. | all of the mentioned |
Answer» E. | |
25. |
Mostly is used in wireless LAN. |
A. | time division multiplexing |
B. | orthogonal frequency division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» C. space division multiplexing | |
26. |
Which of the following protocols is used in the internet? |
A. | http |
B. | dhcp |
C. | dns |
D. | dns, http and dns |
Answer» E. | |
27. |
The physical layer translates logical communication requests from the into hardware specific operations. |
A. | data link layer |
B. | network layer |
C. | trasnport layer |
D. | application layer |
Answer» B. network layer | |
28. |
Which is a time-sensitive service? |
A. | file transfer |
B. | file download |
C. | |
D. | internet telephony |
Answer» E. | |
29. |
The full form of OSI is OSI model is |
A. | open systems interconnection |
B. | open software interconnection |
C. | open systems internet |
D. | open software internet |
Answer» B. open software interconnection | |
30. |
In the slow-start algorithm, the size of the congestion window increases until it reaches a threshold. |
A. | exponentially |
B. | additively |
C. | multiplicatively |
D. | suddenly |
Answer» B. additively | |
31. |
Simple mail transfer protocol (SMTP) utilizes as the transport layer protocol for electronic mail transfer. |
A. | tcp |
B. | udp |
C. | dccp |
D. | sctp |
Answer» B. udp | |
32. |
In layer, vulnerabilities are directly associated with physical access to networks and hardware. |
A. | physical |
B. | data-link |
C. | network |
D. | application |
Answer» B. data-link | |
33. |
RMI uses stub and skeleton for communication with the object. |
A. | client |
B. | remote |
C. | server |
D. | any |
Answer» C. server | |
34. |
The data field cannot carry which of the following? |
A. | tcp segment |
B. | udp segment |
C. | icmp messages |
D. | smtp messages |
Answer» D. smtp messages | |
35. |
What is Wired Equivalent Privacy (WEP)? |
A. | security algorithm for ethernet |
B. | security algorithm for wireless networks |
C. | security algorithm for usb communication |
D. | security algorithm for emails |
Answer» C. security algorithm for usb communication | |
36. |
Which of the following is not correct in relation to multi-destination routing? |
A. | is same as broadcast routing |
B. | contains the list of all destinations |
C. | data is not sent by packets |
D. | there are multiple receivers |
Answer» D. there are multiple receivers | |
37. |
Which of the following demerits does Fragmentation have? |
A. | complicates routers |
B. | open to dos attack |
C. | overlapping of fragments. |
D. | all of the mentioned |
Answer» E. | |
38. |
What is the header size of a UDP packet? |
A. | 8 bytes |
B. | 8 bits |
C. | 16 bytes |
D. | 124 bytes |
Answer» B. 8 bits | |
39. |
Which network topology requires a central controller or hub? |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» B. mesh | |
40. |
specification defining the PHY and MAC layer of low power devices. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» E. | |
41. |
Which of the following computer networks is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» E. | |
42. |
Which of the following routing algorithms can be used for network layer design? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» E. | |
43. |
enables seamless integration of LoWPAN devices with internet leveraging. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» B. ieft coap | |
44. |
Novell’s implementation of RIP updates routing tables every seconds. |
A. | 60 |
B. | 90 |
C. | 10 |
D. | 30 |
Answer» B. 90 | |
45. |
The model is 7-layer architecture where each layer is having some specific functionality to perform. |
A. | tcp/ip |
B. | cloud |
C. | osi |
D. | ois |
Answer» D. ois | |
46. |
What is start frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» C. 00000000 | |
47. |
Adheres to approach for managing resources and support mapping to HTTP. |
A. | retful |
B. | iot |
C. | restful |
D. | restful |
Answer» E. | |
48. |
is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
A. | vlan attack |
B. | vlan circumvention |
C. | vlan compromisation method |
D. | data-link evading |
Answer» C. vlan compromisation method | |
49. |
The required resources for communication between end systems are reserved for the duration of the session between end systems in method. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» C. line switching | |
50. |
Which of the following tasks is not done by data link layer? |
A. | framing |
B. | error control |
C. | flow control |
D. | channel coding |
Answer» E. | |