Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in ASP.NET
D. none of the mentioned
Answer» B. application programming interface
2.

An alternative of javascript on windows platform is

A. VBScript
B. ASP.NET
C. JSP
D. None of the mentioned
Answer» B. ASP.NET
3.

Which one of the following is not used to generate dynamic web pages?

A. PHP
B. ASP.NET
C. JSP
D. None of the mentioned
Answer» E.
4.

A web cookie is a small piece of data

A. sent from a website and stored in user’s web browser while a user is browsing a website
B. sent from user and stored in the server while a user is browsing a website
C. sent from root server to all servers
D. none of the mentioned
Answer» B. sent from user and stored in the server while a user is browsing a website
5.

URL stands for

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» D. unique resource locator
6.

Common gateway interface is used to

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. none of the mentioned
Answer» B. generate web pages
7.

What is a web browser?

A. a program that can display a web page
B. a program used to view html documents
C. it enables user to access the resources of internet
D. all of the mentioned
Answer» E.
8.

Dynamic web page

A. is same every time whenever it displays
B. generates on demand by a program or a request from browser
C. both is same every time whenever it displays and generates on demand by a program or a request from browser
D. none of the mentioned
Answer» C. both is same every time whenever it displays and generates on demand by a program or a request from browser
9.

A piece of icon or image on a web page associated with another webpage is called

A. url
B. hyperlink
C. plugin
D. none of the mentioned
Answer» C. plugin
10.

Frame relay has only

A. physical layer
B. data link layer
C. both physical layer and data link layer
D. none of the mentioned
Answer» D. none of the mentioned
11.

Frame Relay deploys physical layer carriers such as

A. ADMs
B. UPSR
C. BLSR
D. SONET
Answer» E.
12.

Frame Relay does not provide flow or error control, they must be provided by the

A. Lower Level Protocol
B. High Level Protocol
C. Upper Level Protocol
D. Downward Level Protocol
Answer» D. Downward Level Protocol
13.

There are ________ total features of Frame Relay.

A. Five
B. Seven
C. Nine
D. Ten
Answer» D. Ten
14.

Frame Relay networks offer an option called

A. Voice Over For Relay
B. Voice Over Fine Relay
C. Voice On Frame Relay
D. Voice Over Frame Relay
Answer» E.
15.

Frame Relay is very cheap than other

A. LANs
B. WANs
C. MANs
D. Multipoint Networks
Answer» C. MANs
16.

What is FRAD in frame relay network?

A. FRAD assembles and disassembles the frames coming from other protocols
B. FRAD is used for modulation and demodulation
C. FRAD is used for error detection
D. None of the mentioned
Answer» B. FRAD is used for modulation and demodulation
17.

In frame relay networks, extended address is used

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
18.

Frame relay has

A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» E.
19.

Virtual circuit identifier in frame relay is called

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. none of the mentioned
Answer» B. frame relay identifier
20.

Frame relay has error detection at the

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
21.

An ATM cell has the payload field of

A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» C. 64 bytes
22.

ATM can be used for

A. local area network
B. wide area network
C. any of local or wide area network
D. none of the mentioned
Answer» D. none of the mentioned
23.

ATM standard defines _______ layers.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
24.

ATM uses the

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. none of the mentioned
Answer» C. asynchronous space division multiplexing
25.

ATM and frame relay are

A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. none of the mentioned
Answer» B. datagram networks
26.

In data transfer phase, the table contains how many columns?

A. 1
B. 2
C. 3
D. 4
Answer» E.
27.

In virtual circuit network, delay times for setup and teardown respectively are

A. 1 and 1
B. 1 and 2
C. 2 and 1
D. 2 and 2
Answer» B. 1 and 2
28.

Delay if, resource allocated on demand during data transfer is

A. Constant
B. Increases for each packet
C. Same for each packet
D. Different for each packet
Answer» E.
29.

Delay if, resource allocated during setup phase during data transfer is

A. Constant
B. Increases for each packet
C. Same for each packet
D. Different for each packet
Answer» D. Different for each packet
30.

During teardown phase, source after sending all the frames to destination sends……..to notify termination

A. Teardown response
B. Teardown request
C. Termination request
D. Termination response
Answer» C. Termination request
31.

Steps required in setup process are

A. Setup request and acknowledgement
B. Setup request and setup response
C. Setup request and setup termination
D. Setup and termination steps
Answer» B. Setup request and setup response
32.

Which of the following is not a phase of virtual circuit network?

A. Setup phase
B. Datatransfer phase
C. Termination phase
D. Teardown phase
Answer» D. Teardown phase
33.

The Identifier that is used for data transfer in virtual circuit network is

A. Global address
B. Virtual circuit identifier
C. Network identifier
D. IP identifier
Answer» C. Network identifier
34.

The address that is unique in the scope of the network or internationally if the network is part of an international network is called as

A. Global address
B. Network address
C. Physical address
D. IP address
Answer» B. Network address
35.

Which of the following is not a characteristic of Virtual Circuit Network?

A. There are setup and teardown phases in addition to the data transfer phase
B. Resources can be allocated during setup phase or on demand
C. All packets follow the same path established during the connection
D. Virtual circuit network is implemented in application layer
Answer» E.
36.

In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected.

A. Exponentially
B. Additively
C. Multiplicatively
D. None of the mentioned
Answer» C. Multiplicatively
37.

In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold.

A. Exponentially
B. Additively
C. Multiplicatively
D. None of the mentioned
Answer» B. Additively
38.

The packet sent by a node to the source to inform it of congestion is called

A. Explicit
B. Discard
C. Choke
D. Backpressure
Answer» D. Backpressure
39.

Backpressure technique can be applied only to

A. Congestion networks
B. Closed circuit networks
C. Open circuit networks
D. Virtual circuit networks
Answer» E.
40.

The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as

A. Admission policy
B. Backpressure
C. Forward signalling
D. Backward signalling
Answer» C. Forward signalling
41.

Closed-Loop control mechanism try to

A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets
Answer» B. Remove after sometime
42.

Discarding policy is mainly done by

A. Sender
B. Receiver
C. Router
D. Switch
Answer» D. Switch
43.

In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. whereas in Selective Repeat window, tries to send ___________

A. Packet that have not lost
B. Packet that have lost or corrupted
C. Packet from starting
D. All the packets
Answer» C. Packet from starting
44.

Retransmission of packets must be done when

A. Packet is lost
B. Packet is corrupted
C. Packet is needed
D. All of the mentioned
Answer» E.
45.

In open-loop control, policies are applied to __________

A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets
Answer» D. Prevent before sending packets
46.

Two broad categories of congestion control are

A. Open-loop and Closed-loop
B. Open-control and Closed-control
C. Active control and Passive control
D. None of the mentioned
Answer» B. Open-control and Closed-control
47.

Which of the following organizations is primarily concerned with military encryption systems?

A. NSA
B. NIST
C. IEEE
D. ITU
Answer» B. NIST
48.

In computer security… means that the information in a computer system only be accessible for reading by authorized parities.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Answer» B. Integrity
49.

In computer security… means that computer system assets can be modified only by authorized parities.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Answer» C. Availability
50.

ESP provides

A. source authentication
B. data integrity
C. privacy
D. all of the mentioned
Answer» E.