Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

201.

Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?

A. Public
B. Private
C. Nocache/nostore
D. Maxage
Answer» C. Nocache/nostore
202.

Which of the following HTTP method should be idempotent in nature?

A. OPTIONS
B. DELETE
C. POST
D. HEAD
Answer» C. POST
203.

Which of the following is a best practice to create a standard URI for a web service?

A. Maintain Backward Compatibility
B. Use HTTP Verb
C. Both of the mentioned
D. None of the mentioned
Answer» D. None of the mentioned
204.

Which of the following protocol is used by Restful web services as a medium of communication between client and server?

A. HTTP
B. FTP
C. Gopher
D. None of the mentioned
Answer» B. FTP
205.

What REST stands for?

A. Represent State Transfer
B. Representational State Transfer
C. Represent State Transfer
D. None of the mentioned
Answer» C. Represent State Transfer
206.

What is the constraint on the data per cookie?

A. 2 KB
B. 1 KB
C. 4 KB
D. 3 KB
Answer» D. 3 KB
207.

Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?

A. EncodeURIComponent()
B. EncodeURI()
C. EncodeComponent()
D. None of the mentioned
Answer» B. EncodeURI()
208.

Which of the following is a Boolean cookie attribute?

A. Bool
B. Secure
C. Lookup
D. Domain
Answer» C. Lookup
209.

How can you set a Cookie visibility scope to local Storage?

A. /
B. %
C. *
D. All of the mentioned
Answer» B. %
210.

Which of the following can be used to configure the scope of the Cookie visibility?

A. Path
B. Domain
C. Both Path and Domain
D. None of the mentioned
Answer» E.
211.

Which of the following defines the Cookie visibility?

A. Document Path
B. LocalStorage
C. SessionStorage
D. All of the mentioned
Answer» E.
212.

Which attribute is used to extend the lifetime of a cookie?

A. Higherage
B. Increaseage
C. Maxage
D. Lifetime
Answer» D. Lifetime
213.

Which of the following explains Cookies nature?

A. Non Volatile
B. Volatile
C. Intransient
D. Transient
Answer» E.
214.

The Cookie manipulation is done using which property?

A. cookie
B. cookies
C. manipulate
D. none of the mentioned
Answer» B. cookies
215.

Cookies were originally designed for

A. Client side programming
B. Server side programming
C. Both Client side programming and Server side programming
D. None of the mentioned
Answer» C. Both Client side programming and Server side programming
216.

In Int Address class which method returns the host name of the IP Address?

A. Public String get Hostname()
B. Public String getHostAddress()
C. Public static IntAddress get Localhost()
D. None of the mentioned
Answer» B. Public String getHostAddress()
217.

Which classes are used for connection-less socket programming?

A. Datagram Socket
B. Datagram Packet
C. Both Datagram Socket & Datagram Packet
D. None of the mentioned
Answer» D. None of the mentioned
218.

What does the java.net.InetAddress class represent?

A. Socket
B. IP Address
C. Protocol
D. MAC Address
Answer» C. Protocol
219.

TCP, FTP, Telnet, SMTP, POP etc. are examples of?

A. Socket
B. IP Address
C. Protocol
D. MAC Address
Answer» D. MAC Address
220.

The client in socket programming must know which information?

A. IP address of Server
B. Port number
C. Both IP address of Server & Port number
D. None of the mentioned
Answer» D. None of the mentioned
221.

Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?

A. Datagram Socket(int port)
B. Datagram Socket(int port, Int Address address)
C. Datagram Socket()
D. None of the mentioned
Answer» C. Datagram Socket()
222.

Which methods are commonly used in Server Socket class?

A. Public Output Stream get Output Stream ()
B. Public Socket accept ()
C. Public synchronized void close ()
D. None of the mentioned
Answer» C. Public synchronized void close ()
223.

In FTP protocol, client contacts server using _________ as the transport protocol.

A. Transmission control protocol
B. User datagram protocol
C. Datagram congestion control protocol
D. Stream control transmission protocol
Answer» B. User datagram protocol
224.

In the network HTTP resources are located by

A. Uniform resource identifier
B. Unique resource locator
C. Unique resource identifier
D. None of the mentioned
Answer» B. Unique resource locator
225.

Cryptographic hash function takes an arbitrary block of data and returns

A. fixed size bit string
B. variable size bit string
C. both fixed size bit string and variable size bit string
D. none of the mentioned
Answer» B. variable size bit string
226.

ElGamal encryption system is

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Answer» C. not an encryption algorithm
227.

Voice privacy in GSM cellular telephone protocol is provided by

A. A5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» B. b5/4 cipher
228.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A. stream control transmission protocol (SCTP)
B. transport layer security (TSL)
C. explicit congestion notification (ECN)
D. resource reservation protocol
Answer» C. explicit congestion notification (ECN)
229.

Cryptanalysis is used

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. none of the mentioned
Answer» B. to increase the speed
230.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. none of the mentioned
Answer» B. stream cipher
231.

In cryptography, the order of the letters in a message is rearranged by

A. transpositional ciphers
B. substitution ciphers
C. both transpositional ciphers and substitution ciphers
D. none of the mentioned
Answer» B. substitution ciphers
232.

Which one of the following algorithm is not used in asymmetric-key cryptography?

A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer» D. none of the mentioned
233.

In asymmetric key cryptography, the private key is kept by

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» C. sender and receiver
234.

In cryptography, what is cipher?

A. algorithm for performing encryption and decryption
B. encrypted message
C. both algorithm for performing encryption and decryption and encrypted message
D. none of the mentioned
Answer» B. encrypted message
235.

Which routing protocol implements the diffusing update algorithm?

A. IS-IS
B. IGRP
C. EIGRP
D. OSPF
Answer» D. OSPF
236.

Which protocol maintains neighbor adjacencies?

A. RIPv2 and EIGRP
B. IGRP and EIGRP
C. RIPv2
D. EIGRP
Answer» D. EIGRP
237.

What does administrative distance rank?

A. Metrics
B. Sources of routing information
C. Router reliability
D. Best paths
Answer» C. Router reliability
238.

Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains?

A. Higher cost of two routers
B. Routing feedback
C. Cisco IOS incompatibility
D. Not possible to use two routers
Answer» C. Cisco IOS incompatibility
239.

Which two routing protocols can be redistributed into OSPF by a Cisco router?

A. IP EIGRP and AppleTalk EIGRP
B. AppleTalk EIGRP and RIPv2
C. RIPv2 and IP EIGRP
D. IPX RIP & AppleTalk EIGRP
Answer» D. IPX RIP & AppleTalk EIGRP
240.

Which of the situations might not require require multiple routing protocols in a network?

A. When a new Layer 2-only switch is added to the network
B. When you are migrating from one routing protocol to another
C. When you are using routers from multiple vendors
D. When there are host-based routers from multiple vendors
Answer» B. When you are migrating from one routing protocol to another
241.

Which of the following is true regarding RIPv2?

A. It has a lower administrative distance than RIPv1
B. It converges faster than RIPv1
C. It has the same timers as RIPv1
D. It is harder to configure than RIPv1
Answer» D. It is harder to configure than RIPv1
242.

What is route poisoning?

A. It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted
B. It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing
C. It prevents regular update messages from reinstating a route that has just come up
D. It describes when a router sets the metric for a downed link to infinity
Answer» E.
243.

Which statement is true regarding classless routing protocols?

A. The use of discontinuous networks is not allowed
B. The use of variable length subnet masks is permitted
C. RIPv1 is a classless routing protocol
D. RIPv2 supports classless routing
Answer» C. RIPv1 is a classless routing protocol
244.

Where we should use default routing

A. On stub networks- which have only one exit path out of the network
B. Which have more than one exit path out of the network
C. Minimum five exit paths out of the network
D. None of the mentioned
Answer» B. Which have more than one exit path out of the network
245.

Which statement is true regarding classless routing protocol?

A. The use of discontinuous networks is not allowed
B. Use of variable length subnet masks is permitted
C. RIPv1 is a classless routing protocol
D. IGRP supports classes routing within the same autonomous system
Answer» C. RIPv1 is a classless routing protocol
246.

Default administrative distance of RIP

A. 0
B. 90
C. 120
D. 130
Answer» D. 130
247.

Which protocol gives a full route table update every 30 seconds?

A. IEGRP
B. RIP
C. both IEGRP and RIP
D. none of the mentioned
Answer» C. both IEGRP and RIP
248.

Default administrative distance of Static Route

A. 0
B. 90
C. 100
D. 1
Answer» E.
249.

You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?

A. The route is 16 hops away Debug IP rip
B. The route has a delay of 16 microseconds Debug IP route
C. The route is inaccessible
D. The route is queued at 16 messages a second
Answer» D. The route is queued at 16 messages a second
250.

Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?

A. The updated information will be added to the existing routing table Debug IP rip
B. The update will be ignored and no further action will occur Debug IP route
C. The updated information will replace the existing routing table entry
D. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence
Answer» C. The updated information will replace the existing routing table entry