

MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
51. |
RPF stands for |
A. | reverse path forwarding |
B. | reverse path failure |
C. | reverse packet forwarding |
D. | reverse protocol failure |
Answer» B. reverse path failure | |
52. |
Which of the following is a data link protocol? |
A. | ethernet |
B. | point to point protocol |
C. | hdlc |
D. | all of the mentioned |
Answer» E. | |
53. |
Which of the following is false with respect to TCP? |
A. | connection-oriented |
B. | process-to-process |
C. | transport layer protocol |
D. | unreliable |
Answer» E. | |
54. |
Which of the following is not an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | error control |
Answer» E. | |
55. |
topology requires a multipoint connection. |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» E. | |
56. |
As the resources are reserved between two communicating end systems in circuit switching, is achieved. |
A. | authentication |
B. | guaranteed constant rate |
C. | reliability |
D. | store and forward |
Answer» C. reliability | |
57. |
The layer, which provides the interface that client and server application objects use to interact with each other. |
A. | increasing |
B. | count |
C. | bit |
D. | stub/skeleton |
Answer» E. | |
58. |
What is the main advantage of UDP? |
A. | more overload |
B. | reliable |
C. | low overhead |
D. | fast |
Answer» D. fast | |
59. |
Which NetWare protocol works on layer 3– network layer—of the OSI model? |
A. | ipx |
B. | ncp |
C. | spx |
D. | netbios |
Answer» B. ncp | |
60. |
In systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» B. circuit switching | |
61. |
resources are identified by Uniform Resource Identifiers. |
A. | coap |
B. | hmtp |
C. | mqtt |
D. | tcp/ip |
Answer» B. hmtp | |
62. |
A firewall needs to be                      so that it can grow proportionally with the network that it protects. |
A. | robust |
B. | expansive |
C. | fast |
D. | scalable |
Answer» C. fast | |
63. |
A packet filter firewall filters at |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» D. application layer | |
64. |
A proxy firewall filters at |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» E. | |
65. |
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as |
A. | chock point |
B. | meeting point |
C. | firewall point |
D. | secure point |
Answer» B. meeting point | |
66. |
Network layer firewall has two sub- categories as |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» B. bit oriented firewall and byte oriented firewall | |
67. |
Network layer firewall works as a |
A. | frame filter |
B. | packet filter |
C. | content filter |
D. | virus filter |
Answer» C. content filter | |
68. |
The client_key_exchange message uses a pre master key of size – |
A. | 48 bytes |
B. | 56 bytes |
C. | 64 bytes |
D. | 32 bytes |
Answer» B. 56 bytes | |
69. |
The RSA signature uses which hash algorithm? |
A. | md5 |
B. | sha-1 |
C. | md5 and sha-1 |
D. | none of the mentioned. |
Answer» D. none of the mentioned. | |
70. |
The certificate_request massage includes two parameters, one of which is- |
A. | certificate_extension |
B. | certificate_creation |
C. | certificate_exchange |
D. | certificate_type |
Answer» E. | |
71. |
In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems? |
A. | fortezza |
B. | anonymous diffie-hellman |
C. | fixed diffie-hellman |
D. | rsa |
Answer» D. rsa | |
72. |
The certificate message is required for any agreed-on key exchange method except |
A. | ephemeral diffie-hellman |
B. | anonymous diffie-hellman |
C. | fixed diffie-hellman |
D. | rsa |
Answer» C. fixed diffie-hellman | |
73. |
Which is the key exchange algorithm used in CipherSuite parameter? |
A. | rsa |
B. | fixed diffie-hellman |
C. | ephemeral diffie-hellman |
D. | any of the mentioned |
Answer» E. | |
74. |
In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange? |
A. | server_done |
B. | server_key_exchange |
C. | certificate_request |
D. | crtificate_verify |
Answer» B. server_key_exchange | |
75. |
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as |
A. | delivery of packets |
B. | error correction |
C. | multiplexing |
D. | demultiplexing |
Answer» E. | |
76. |
In the SSL record protocol operation pad_1 is – |
A. | is the byte 0x36 repeated 40 times for md5 |
B. | is the byte 0x5c repeated 40 times for md5 |
C. | is the byte 0x5c repeated 48 times for sha-1 |
D. | is the byte 0x36 repeated 48 times for md5 |
Answer» E. | |
77. |
In the SSL record protocol operation pad_2 is – |
A. | is the byte 0x36 repeated 40 times for md5 |
B. | is the byte 0x5c repeated 48 times for md5 |
C. | is the byte 0x5c repeated 48 times for sha-1 |
D. | is the byte 0x36 repeated 48 times for md5 |
Answer» C. is the byte 0x5c repeated 48 times for sha-1 | |
78. |
Number of phases in the handshaking protocol? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
79. |
Which of the following is false with respect to Connectionless service of transport layer protocol? |
A. | packets are not numbered |
B. | packets are not delayed |
C. | no acknowledgement |
D. | packet may arrive out of sequence |
Answer» C. no acknowledgement | |
80. |
In transport layer, Multiplexing is done at |
A. | channel |
B. | receiver site |
C. | sender site |
D. | packet |
Answer» D. packet | |
81. |
The combination of an IP address and port number is called as |
A. | socket address |
B. | port address |
C. | mac address |
D. | host address |
Answer» B. port address | |
82. |
Multiple processes on destinations at transport layer are identified by |
A. | mac address |
B. | port number |
C. | host number |
D. | host address |
Answer» C. host number | |
83. |
According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges? |
A. | well-known ports |
B. | registered ports |
C. | dynamic ports |
D. | static ports |
Answer» E. | |
84. |
Which layer is responsible for process-to- process delivery? |
A. | physical layer |
B. | network layer |
C. | transport layer |
D. | application layer |
Answer» D. application layer | |
85. |
An SMTP session may not include |
A. | zero smtp transaction |
B. | one smtp transaction |
C. | more than one smtp transaction |
D. | one http transaction |
Answer» E. | |
86. |
6 INTRODUCTION TO PEER TO PEER NETWORKS |
A. | client/server |
B. | source/destination |
C. | message transfer |
D. | peer to peer |
Answer» B. source/destination | |
87. |
SMTP defines |
A. | message transport |
B. | message encryption |
C. | message content |
D. | message password |
Answer» B. message encryption | |
88. |
SMTP connections secured by SSL are known as |
A. | smtps |
B. | ssmtp |
C. | snmp |
D. | starttls |
Answer» B. ssmtp | |
89. |
Simple mail transfer protocol (SMTP) utilizes                    as the transport layer protocol for electronic mail transfer. |
A. | tcp |
B. | udp |
C. | dccp |
D. | sctp |
Answer» B. udp | |
90. |
The domain name system is maintained by |
A. | distributed database system |
B. | a single server |
C. | a single computer |
D. | none of the mentioned |
Answer» B. a single server | |
91. |
The right to use a domain name is delegated by domain name registers which are accredited by |
A. | internet architecture board |
B. | internet society |
C. | internet research task force |
D. | internet corporation for assigned names and numbers |
Answer» E. | |
92. |
DNS database contains |
A. | name server records |
B. | hostname-to-address records |
C. | hostname aliases |
D. | all of the mentioned |
Answer» E. | |
93. |
Wildcard domain names start with label |
A. | @ |
B. | * |
C. | & |
D. | # |
Answer» C. & | |
94. |
Which one of the following allows client to update their DNS entry as their IP address change? |
A. | dynamic dns |
B. | mail transfer agent |
C. | authoritative name server |
D. | none of the mentioned |
Answer» B. mail transfer agent | |
95. |
If a server has no clue about where to find the address for a hostname then |
A. | server asks to the root server |
B. | server asks to its adjcent server |
C. | request is not processed |
D. | none of the mentioned |
Answer» B. server asks to its adjcent server | |
96. |
A DNS client is called |
A. | dns updater |
B. | dns resolver |
C. | dns handler |
D. | none of the mentioned |
Answer» C. dns handler | |
97. |
An alternative to JavaScript on windows platform is |
A. | vbscript |
B. | asp.net |
C. | jsp |
D. | php |
Answer» B. asp.net | |
98. |
AJAX stands for |
A. | asynchronous javascript and xml |
B. | advanced jsp and xml |
C. | asynchronous jsp and xml |
D. | advanced javascript and xml |
Answer» B. advanced jsp and xml | |
99. |
A web cookie is a small piece of data that is |
A. | sent from a website and stored in user’s web browser while a user is browsing a website |
B. | sent from user and stored in the server while a user is browsing a website |
C. | sent from root server to all servers |
D. | sent from the root server to other root servers |
Answer» B. sent from user and stored in the server while a user is browsing a website | |
100. |
Common gateway interface is used to |
A. | generate executable files from web content by web server |
B. | generate web pages |
C. | stream videos |
D. | download media files |
Answer» B. generate web pages | |