Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

151.

What tells a firewall how to reassemble a data stream that has been divided into packets?

A. The source routing future
B. The number in the header’s identification field
C. The destination IP address
D. The header checksum field in the packet header
Answer» B. The number in the header’s identification field
152.

What is one advantage of setting up a DMZ with two firewalls?

A. You can control where traffic goes in three networks
B. You can do stateful packet filtering
C. You can do load balancing
D. Improved network performance
Answer» D. Improved network performance
153.

A packet filter firewall filters at?

A. Physical layer
B. Data link layer
C. Network layer or Transport layer
D. Application layer
Answer» D. Application layer
154.

A proxy firewall filters at?

A. Physical layer
B. Data link layer
C. Network layer
D. Application layer
Answer» E.
155.

Which of the following is / are the types of firewall?

A. Packet Filtering Firewall
B. Dual Homed Gateway Firewall
C. Screen Host Firewall
D. All of the mentioned
Answer» B. Dual Homed Gateway Firewall
156.

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as __________

A. Chock point
B. Meeting point
C. Firewall point
D. Secure point
Answer» B. Meeting point
157.

Which of the following is true with respect to the datagram networks?

A. Number of flows of packets are not limited
B. Packets may not be in order at the destination
C. Path is not reserved
D. All of the mentioned
Answer» E.
158.

The probability of the error in a transmitted block _________ with the length of the block

A. Remains same
B. Decreases
C. Increases
D. None of the mentioned
Answer» D. None of the mentioned
159.

During datagram switching, the packets are placed in __________ to wait until the given transmission line becomes available.

A. Stack
B. Queue
C. Hash
D. Routing table
Answer» C. Hash
160.

Which of the following is true with respect to the delay in datagram networks?

A. Delay is greater than in a virtual circuit network
B. Each packet may experience a wait at a switch
C. Delay is not uniform for the packets of a message
D. All of the mentioned
Answer» E.
161.

Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet?

A. Destination address
B. Source address
C. Checksum
D. Padding
Answer» B. Source address
162.

The main contents of the routing table in datagram networks are

A. Source and Destination address
B. Destination address and Output port
C. Source address and Output port
D. Input port and Output port
Answer» C. Source address and Output port
163.

Datagrams are routed to their destinations with the help of

A. Switch table
B. Segments table
C. Datagram table
D. Routing table
Answer» D. Routing table
164.

Datagram networks mainly refers to

A. Connection oriented networks
B. Connection less networks
C. Telephone networks
D. Internetwork
Answer» C. Telephone networks
165.

Packets in datagram switching are referred to as

A. Switches
B. Segments
C. Datagrams
D. Data-packets
Answer» D. Data-packets
166.

Datagram switching is done at which layer of OSI model?

A. Network layer
B. Physical layer
C. Application layer
D. Transport layer
Answer» B. Physical layer
167.

At which interval does OSPF refresh LSAs?

A. 10 seconds
B. 30 seconds
C. 30 minutes
D. 1 hour
Answer» E.
168.

DBD packets are involved during which two states?

A. Exstart
B. Loading
C. Exchange
D. Two-way
Answer» B. Loading
169.

Which multicast address does the OSPF Hello protocol use?

A. 224.0.0.5
B. 224.0.0.6
C. 224.0.0.7
D. 224.0.0.8
Answer» B. 224.0.0.6
170.

Which packet is NOT an OSPF packet type?

A. LSU
B. LSR
C. DBD
D. Query
Answer» E.
171.

What is the IP protocol number for OSPF packets?

A. 89
B. 86
C. 20
D. 76
Answer» B. 86
172.

The outcome of Dijkstra’s calculation is used to populate the __________

A. Topology table
B. Routing table
C. Neighbor table
D. Adjacency table
Answer» C. Neighbor table
173.

Each LSA has its own age timer. By default, how long does an LSA wait before requiring an update?

A. 30 seconds
B. 1 minute
C. 30 minutes
D. 1 hour
Answer» D. 1 hour
174.

An OSPF router receives an LSA. The router checks its sequence number and finds that this number is lower than the sequence number it already has. What does the router do with the LSA?

A. ignores the LSA
B. adds it to the database
C. sends newer LSU update to source router
D. floods the LSA to the other routers
Answer» D. floods the LSA to the other routers
175.

An OSPF router receives an LSA. The router checks its sequence number and finds that this number is higher than the sequence number it already has. Which two tasks does the router perform with the LSA?

A. Ignores the LSA
B. Adds it to the database
C. Sends newer LSU update to source router
D. Floods the LSA to the other routers
Answer» C. Sends newer LSU update to source router
176.

An OSPF router receives an LSA, the router checks its sequence number, and this number matches the sequence number of the LSA that the receiving router already has. What does the receiving router do with the LSA?

A. Ignores the LSA
B. Adds it to the database
C. Sends newer LSU update to source router
D. Floods the LSA to the other routers
Answer» B. Adds it to the database
177.

In OSPF database descriptor packet, which field is used to indicate that the router is master

A. M
B. MS
C. I
D. Options
Answer» C. I
178.

In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’ field is set to

A. 1
B. 0
C. more
D. none
Answer» B. 0
179.

In OSPF header, which field is used to detect errors in the packet?

A. Type
B. Area ID
C. Authentication type
D. Checksum
Answer» D. Checksum
180.

Correct order of the operations of OSPF 1. Hello packets 2. Propagation of link-state information and building of routing tables 3. Establishing adjacencies and synchronisation database

A. 1-2-3
B. 1-3-2
C. 3-2-1
D. 2-1-3
Answer» C. 3-2-1
181.

Which of the following is not a type of OSPF packet?

A. Hello
B. Link-state request
C. Link-state response
D. Link-state ACK
Answer» D. Link-state ACK
182.

In OSPF, which protocol is used to discover neighbour routers automatically?

A. Link state protocol
B. Error-correction protocol
C. Routing information protocol
D. Hello protocol
Answer» E.
183.

Which of the following is false with respect to the features of OSPF

A. Support for fixed-length sunbathing by including the subnet mask in the routing message
B. More flexible link cost than can range from 1 to 65535
C. Use of designated router
D. Distribution of traffic over multiple paths that have equal cost to the destination
Answer» B. More flexible link cost than can range from 1 to 65535
184.

The computation of the shortest path in OSPF is usually done by

A. Bellman-ford algorithm
B. Routing information protocol
C. Dijkstra’s algorithm
D. Distance vector routing
Answer» D. Distance vector routing
185.

Open Shortest Path First (OSPF) is also called as

A. Link state protocol
B. Error-correction protocol
C. Routing information protocol
D. All of the mentioned
Answer» B. Error-correction protocol
186.

Network layer firewall has two sub-categories as

A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. none of the mentioned
Answer» B. bit oriented firewall and byte oriented firewall
187.

Network layer firewall works as a

A. frame filter
B. packet filter
C. both frame filter and packet filter
D. none of the mentioned
Answer» C. both frame filter and packet filter
188.

LSP stands for

A. Link Stable Packet
B. Link State Packet
C. Link State Protocol
D. Link State Path
Answer» C. Link State Protocol
189.

RPF stands for

A. Reverse Path Forwarding
B. Reverse Path Failure
C. Reverse Packet Forwarding
D. Reverse Protocol Failure
Answer» B. Reverse Path Failure
190.

In Multicast Routing Protocol, flooding is used to broadcast packets but it creates

A. Gaps
B. Loops
C. Holes
D. Links
Answer» C. Holes
191.

In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a

A. Graph
B. Tree
C. Network
D. Link
Answer» B. Tree
192.

In Unicast routing, if instability is between three nodes, stability cannot be

A. Stable
B. Reversed
C. Guaranteed
D. Forward
Answer» D. Forward
193.

Host-specific routing is used for purposes such as checking route or providing

A. Network Measures
B. Security Measures
C. Routing Measures
D. Delivery Measures
Answer» C. Routing Measures
194.

Several techniques can make size of routing table manageable and also handle issues such as

A. Maturity
B. Error reporting
C. Tunneling
D. Security
Answer» E.
195.

Next-Hop Method is used to reduce contents of a

A. Revolving table
B. Rotating Table
C. Routing Table
D. Re-allocate table
Answer» D. Re-allocate table
196.

A second technique to reduce routing table and simplify searching process is called

A. Network-Specific Method
B. Network-Specific Motion
C. Network-Specific Maintaining
D. Network-Specific Membership
Answer» B. Network-Specific Motion
197.

Term is used to place packet in its route to its destination is called

A. Delayed
B. Urgent
C. Forwarding
D. Delivering
Answer» D. Delivering
198.

Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?

A. @PathParam
B. @QueryParam
C. @MatrixParam
D. @HeaderParam
Answer» D. @HeaderParam
199.

Which of the following annotation of JAX RS API is used to annotate a method used to create resource?

A. @Path
B. @GET
C. @PUT
D. @POST
Answer» D. @POST
200.

Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?

A. 200
B. 201
C. 204
D. 304
Answer» C. 204