

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
151. |
What tells a firewall how to reassemble a data stream that has been divided into packets? |
A. | The source routing future |
B. | The number in the header’s identification field |
C. | The destination IP address |
D. | The header checksum field in the packet header |
Answer» B. The number in the header’s identification field | |
152. |
What is one advantage of setting up a DMZ with two firewalls? |
A. | You can control where traffic goes in three networks |
B. | You can do stateful packet filtering |
C. | You can do load balancing |
D. | Improved network performance |
Answer» D. Improved network performance | |
153. |
A packet filter firewall filters at? |
A. | Physical layer |
B. | Data link layer |
C. | Network layer or Transport layer |
D. | Application layer |
Answer» D. Application layer | |
154. |
A proxy firewall filters at? |
A. | Physical layer |
B. | Data link layer |
C. | Network layer |
D. | Application layer |
Answer» E. | |
155. |
Which of the following is / are the types of firewall? |
A. | Packet Filtering Firewall |
B. | Dual Homed Gateway Firewall |
C. | Screen Host Firewall |
D. | All of the mentioned |
Answer» B. Dual Homed Gateway Firewall | |
156. |
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as __________ |
A. | Chock point |
B. | Meeting point |
C. | Firewall point |
D. | Secure point |
Answer» B. Meeting point | |
157. |
Which of the following is true with respect to the datagram networks? |
A. | Number of flows of packets are not limited |
B. | Packets may not be in order at the destination |
C. | Path is not reserved |
D. | All of the mentioned |
Answer» E. | |
158. |
The probability of the error in a transmitted block _________ with the length of the block |
A. | Remains same |
B. | Decreases |
C. | Increases |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
159. |
During datagram switching, the packets are placed in __________ to wait until the given transmission line becomes available. |
A. | Stack |
B. | Queue |
C. | Hash |
D. | Routing table |
Answer» C. Hash | |
160. |
Which of the following is true with respect to the delay in datagram networks? |
A. | Delay is greater than in a virtual circuit network |
B. | Each packet may experience a wait at a switch |
C. | Delay is not uniform for the packets of a message |
D. | All of the mentioned |
Answer» E. | |
161. |
Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet? |
A. | Destination address |
B. | Source address |
C. | Checksum |
D. | Padding |
Answer» B. Source address | |
162. |
The main contents of the routing table in datagram networks are |
A. | Source and Destination address |
B. | Destination address and Output port |
C. | Source address and Output port |
D. | Input port and Output port |
Answer» C. Source address and Output port | |
163. |
Datagrams are routed to their destinations with the help of |
A. | Switch table |
B. | Segments table |
C. | Datagram table |
D. | Routing table |
Answer» D. Routing table | |
164. |
Datagram networks mainly refers to |
A. | Connection oriented networks |
B. | Connection less networks |
C. | Telephone networks |
D. | Internetwork |
Answer» C. Telephone networks | |
165. |
Packets in datagram switching are referred to as |
A. | Switches |
B. | Segments |
C. | Datagrams |
D. | Data-packets |
Answer» D. Data-packets | |
166. |
Datagram switching is done at which layer of OSI model? |
A. | Network layer |
B. | Physical layer |
C. | Application layer |
D. | Transport layer |
Answer» B. Physical layer | |
167. |
At which interval does OSPF refresh LSAs? |
A. | 10 seconds |
B. | 30 seconds |
C. | 30 minutes |
D. | 1 hour |
Answer» E. | |
168. |
DBD packets are involved during which two states? |
A. | Exstart |
B. | Loading |
C. | Exchange |
D. | Two-way |
Answer» B. Loading | |
169. |
Which multicast address does the OSPF Hello protocol use? |
A. | 224.0.0.5 |
B. | 224.0.0.6 |
C. | 224.0.0.7 |
D. | 224.0.0.8 |
Answer» B. 224.0.0.6 | |
170. |
Which packet is NOT an OSPF packet type? |
A. | LSU |
B. | LSR |
C. | DBD |
D. | Query |
Answer» E. | |
171. |
What is the IP protocol number for OSPF packets? |
A. | 89 |
B. | 86 |
C. | 20 |
D. | 76 |
Answer» B. 86 | |
172. |
The outcome of Dijkstra’s calculation is used to populate the __________ |
A. | Topology table |
B. | Routing table |
C. | Neighbor table |
D. | Adjacency table |
Answer» C. Neighbor table | |
173. |
Each LSA has its own age timer. By default, how long does an LSA wait before requiring an update? |
A. | 30 seconds |
B. | 1 minute |
C. | 30 minutes |
D. | 1 hour |
Answer» D. 1 hour | |
174. |
An OSPF router receives an LSA. The router checks its sequence number and finds that this number is lower than the sequence number it already has. What does the router do with the LSA? |
A. | ignores the LSA |
B. | adds it to the database |
C. | sends newer LSU update to source router |
D. | floods the LSA to the other routers |
Answer» D. floods the LSA to the other routers | |
175. |
An OSPF router receives an LSA. The router checks its sequence number and finds that this number is higher than the sequence number it already has. Which two tasks does the router perform with the LSA? |
A. | Ignores the LSA |
B. | Adds it to the database |
C. | Sends newer LSU update to source router |
D. | Floods the LSA to the other routers |
Answer» C. Sends newer LSU update to source router | |
176. |
An OSPF router receives an LSA, the router checks its sequence number, and this number matches the sequence number of the LSA that the receiving router already has. What does the receiving router do with the LSA? |
A. | Ignores the LSA |
B. | Adds it to the database |
C. | Sends newer LSU update to source router |
D. | Floods the LSA to the other routers |
Answer» B. Adds it to the database | |
177. |
In OSPF database descriptor packet, which field is used to indicate that the router is master |
A. | M |
B. | MS |
C. | I |
D. | Options |
Answer» C. I | |
178. |
In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’ field is set to |
A. | 1 |
B. | 0 |
C. | more |
D. | none |
Answer» B. 0 | |
179. |
In OSPF header, which field is used to detect errors in the packet? |
A. | Type |
B. | Area ID |
C. | Authentication type |
D. | Checksum |
Answer» D. Checksum | |
180. |
Correct order of the operations of OSPF 1. Hello packets 2. Propagation of link-state information and building of routing tables 3. Establishing adjacencies and synchronisation database |
A. | 1-2-3 |
B. | 1-3-2 |
C. | 3-2-1 |
D. | 2-1-3 |
Answer» C. 3-2-1 | |
181. |
Which of the following is not a type of OSPF packet? |
A. | Hello |
B. | Link-state request |
C. | Link-state response |
D. | Link-state ACK |
Answer» D. Link-state ACK | |
182. |
In OSPF, which protocol is used to discover neighbour routers automatically? |
A. | Link state protocol |
B. | Error-correction protocol |
C. | Routing information protocol |
D. | Hello protocol |
Answer» E. | |
183. |
Which of the following is false with respect to the features of OSPF |
A. | Support for fixed-length sunbathing by including the subnet mask in the routing message |
B. | More flexible link cost than can range from 1 to 65535 |
C. | Use of designated router |
D. | Distribution of traffic over multiple paths that have equal cost to the destination |
Answer» B. More flexible link cost than can range from 1 to 65535 | |
184. |
The computation of the shortest path in OSPF is usually done by |
A. | Bellman-ford algorithm |
B. | Routing information protocol |
C. | Dijkstra’s algorithm |
D. | Distance vector routing |
Answer» D. Distance vector routing | |
185. |
Open Shortest Path First (OSPF) is also called as |
A. | Link state protocol |
B. | Error-correction protocol |
C. | Routing information protocol |
D. | All of the mentioned |
Answer» B. Error-correction protocol | |
186. |
Network layer firewall has two sub-categories as |
A. | stateful firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | none of the mentioned |
Answer» B. bit oriented firewall and byte oriented firewall | |
187. |
Network layer firewall works as a |
A. | frame filter |
B. | packet filter |
C. | both frame filter and packet filter |
D. | none of the mentioned |
Answer» C. both frame filter and packet filter | |
188. |
LSP stands for |
A. | Link Stable Packet |
B. | Link State Packet |
C. | Link State Protocol |
D. | Link State Path |
Answer» C. Link State Protocol | |
189. |
RPF stands for |
A. | Reverse Path Forwarding |
B. | Reverse Path Failure |
C. | Reverse Packet Forwarding |
D. | Reverse Protocol Failure |
Answer» B. Reverse Path Failure | |
190. |
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates |
A. | Gaps |
B. | Loops |
C. | Holes |
D. | Links |
Answer» C. Holes | |
191. |
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a |
A. | Graph |
B. | Tree |
C. | Network |
D. | Link |
Answer» B. Tree | |
192. |
In Unicast routing, if instability is between three nodes, stability cannot be |
A. | Stable |
B. | Reversed |
C. | Guaranteed |
D. | Forward |
Answer» D. Forward | |
193. |
Host-specific routing is used for purposes such as checking route or providing |
A. | Network Measures |
B. | Security Measures |
C. | Routing Measures |
D. | Delivery Measures |
Answer» C. Routing Measures | |
194. |
Several techniques can make size of routing table manageable and also handle issues such as |
A. | Maturity |
B. | Error reporting |
C. | Tunneling |
D. | Security |
Answer» E. | |
195. |
Next-Hop Method is used to reduce contents of a |
A. | Revolving table |
B. | Rotating Table |
C. | Routing Table |
D. | Re-allocate table |
Answer» D. Re-allocate table | |
196. |
A second technique to reduce routing table and simplify searching process is called |
A. | Network-Specific Method |
B. | Network-Specific Motion |
C. | Network-Specific Maintaining |
D. | Network-Specific Membership |
Answer» B. Network-Specific Motion | |
197. |
Term is used to place packet in its route to its destination is called |
A. | Delayed |
B. | Urgent |
C. | Forwarding |
D. | Delivering |
Answer» D. Delivering | |
198. |
Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path? |
A. | @PathParam |
B. | @QueryParam |
C. | @MatrixParam |
D. | @HeaderParam |
Answer» D. @HeaderParam | |
199. |
Which of the following annotation of JAX RS API is used to annotate a method used to create resource? |
A. | @Path |
B. | @GET |
C. | @PUT |
D. | @POST |
Answer» D. @POST | |
200. |
Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request? |
A. | 200 |
B. | 201 |
C. | 204 |
D. | 304 |
Answer» C. 204 | |