Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

51.

RPF stands for

A. reverse path forwarding
B. reverse path failure
C. reverse packet forwarding
D. reverse protocol failure
Answer» B. reverse path failure
52.

Which of the following is a data link protocol?

A. ethernet
B. point to point protocol
C. hdlc
D. all of the mentioned
Answer» E.
53.

Which of the following is false with respect to TCP?

A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Answer» E.
54.

Which of the following is not an application layer service?

A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. error control
Answer» E.
55.

topology requires a multipoint connection.

A. star
B. mesh
C. ring
D. bus
Answer» E.
56.

As the resources are reserved between two communicating end systems in circuit switching,                        is achieved.

A. authentication
B. guaranteed constant rate
C. reliability
D. store and forward
Answer» C. reliability
57.

The                        layer, which provides the interface that client and server application objects use to interact with each other.

A. increasing
B. count
C. bit
D. stub/skeleton
Answer» E.
58.

What is the main advantage of UDP?

A. more overload
B. reliable
C. low overhead
D. fast
Answer» D. fast
59.

Which NetWare protocol works on layer 3– network layer—of the OSI model?

A. ipx
B. ncp
C. spx
D. netbios
Answer» B. ncp
60.

In                    systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
61.

resources are identified by Uniform Resource Identifiers.

A. coap
B. hmtp
C. mqtt
D. tcp/ip
Answer» B. hmtp
62.

A firewall needs to be                      so that it can grow proportionally with the network that it protects.

A. robust
B. expansive
C. fast
D. scalable
Answer» C. fast
63.

A packet filter firewall filters at

A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Answer» D. application layer
64.

A proxy firewall filters at

A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» E.
65.

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

A. chock point
B. meeting point
C. firewall point
D. secure point
Answer» B. meeting point
66.

Network layer firewall has two sub- categories as

A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» B. bit oriented firewall and byte oriented firewall
67.

Network layer firewall works as a

A. frame filter
B. packet filter
C. content filter
D. virus filter
Answer» C. content filter
68.

The client_key_exchange message uses a pre master key of size –

A. 48 bytes
B. 56 bytes
C. 64 bytes
D. 32 bytes
Answer» B. 56 bytes
69.

The RSA signature uses which hash algorithm?

A. md5
B. sha-1
C. md5 and sha-1
D. none of the mentioned.
Answer» D. none of the mentioned.
70.

The certificate_request massage includes two parameters, one of which is-

A. certificate_extension
B. certificate_creation
C. certificate_exchange
D. certificate_type
Answer» E.
71.

In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

A. fortezza
B. anonymous diffie-hellman
C. fixed diffie-hellman
D. rsa
Answer» D. rsa
72.

The certificate message is required for any agreed-on key exchange method except

A. ephemeral diffie-hellman
B. anonymous diffie-hellman
C. fixed diffie-hellman
D. rsa
Answer» C. fixed diffie-hellman
73.

Which is the key exchange algorithm used in CipherSuite parameter?

A. rsa
B. fixed diffie-hellman
C. ephemeral diffie-hellman
D. any of the mentioned
Answer» E.
74.

In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

A. server_done
B. server_key_exchange
C. certificate_request
D. crtificate_verify
Answer» B. server_key_exchange
75.

The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as

A. delivery of packets
B. error correction
C. multiplexing
D. demultiplexing
Answer» E.
76.

In the SSL record protocol operation pad_1 is –

A. is the byte 0x36 repeated 40 times for md5
B. is the byte 0x5c repeated 40 times for md5
C. is the byte 0x5c repeated 48 times for sha-1
D. is the byte 0x36 repeated 48 times for md5
Answer» E.
77.

In the SSL record protocol operation pad_2 is –

A. is the byte 0x36 repeated 40 times for md5
B. is the byte 0x5c repeated 48 times for md5
C. is the byte 0x5c repeated 48 times for sha-1
D. is the byte 0x36 repeated 48 times for md5
Answer» C. is the byte 0x5c repeated 48 times for sha-1
78.

Number of phases in the handshaking protocol?

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
79.

Which of the following is false with respect to Connectionless service of transport layer protocol?

A. packets are not numbered
B. packets are not delayed
C. no acknowledgement
D. packet may arrive out of sequence
Answer» C. no acknowledgement
80.

In transport layer, Multiplexing is done at

A. channel
B. receiver site
C. sender site
D. packet
Answer» D. packet
81.

The combination of an IP address and port number is called as

A. socket address
B. port address
C. mac address
D. host address
Answer» B. port address
82.

Multiple processes on destinations at transport layer are identified by

A. mac address
B. port number
C. host number
D. host address
Answer» C. host number
83.

According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?

A. well-known ports
B. registered ports
C. dynamic ports
D. static ports
Answer» E.
84.

Which layer is responsible for process-to- process delivery?

A. physical layer
B. network layer
C. transport layer
D. application layer
Answer» D. application layer
85.

An SMTP session may not include

A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
Answer» E.
86.

6 INTRODUCTION TO PEER TO PEER NETWORKS

A. client/server
B. source/destination
C. message transfer
D. peer to peer
Answer» B. source/destination
87.

SMTP defines

A. message transport
B. message encryption
C. message content
D. message password
Answer» B. message encryption
88.

SMTP connections secured by SSL are known as

A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» B. ssmtp
89.

Simple mail transfer protocol (SMTP) utilizes                    as the transport layer protocol for electronic mail transfer.

A. tcp
B. udp
C. dccp
D. sctp
Answer» B. udp
90.

The domain name system is maintained by

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» B. a single server
91.

The right to use a domain name is delegated by domain name registers which are accredited by

A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Answer» E.
92.

DNS database contains

A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» E.
93.

Wildcard domain names start with label

A. @
B. *
C. &
D. #
Answer» C. &
94.

Which one of the following allows client to update their DNS entry as their IP address change?

A. dynamic dns
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Answer» B. mail transfer agent
95.

If a server has no clue about where to find the address for a hostname then

A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» B. server asks to its adjcent server
96.

A DNS client is called

A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer» C. dns handler
97.

An alternative to JavaScript on windows platform is

A. vbscript
B. asp.net
C. jsp
D. php
Answer» B. asp.net
98.

AJAX stands for

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» B. advanced jsp and xml
99.

A web cookie is a small piece of data that is

A. sent from a website and stored in user’s web browser while a user is browsing a website
B. sent from user and stored in the server while a user is browsing a website
C. sent from root server to all servers
D. sent from the root server to other root servers
Answer» B. sent from user and stored in the server while a user is browsing a website
100.

Common gateway interface is used to

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Answer» B. generate web pages