

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
201. |
Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server? |
A. | Public |
B. | Private |
C. | Nocache/nostore |
D. | Maxage |
Answer» C. Nocache/nostore | |
202. |
Which of the following HTTP method should be idempotent in nature? |
A. | OPTIONS |
B. | DELETE |
C. | POST |
D. | HEAD |
Answer» C. POST | |
203. |
Which of the following is a best practice to create a standard URI for a web service? |
A. | Maintain Backward Compatibility |
B. | Use HTTP Verb |
C. | Both of the mentioned |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
204. |
Which of the following protocol is used by Restful web services as a medium of communication between client and server? |
A. | HTTP |
B. | FTP |
C. | Gopher |
D. | None of the mentioned |
Answer» B. FTP | |
205. |
What REST stands for? |
A. | Represent State Transfer |
B. | Representational State Transfer |
C. | Represent State Transfer |
D. | None of the mentioned |
Answer» C. Represent State Transfer | |
206. |
What is the constraint on the data per cookie? |
A. | 2 KB |
B. | 1 KB |
C. | 4 KB |
D. | 3 KB |
Answer» D. 3 KB | |
207. |
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value? |
A. | EncodeURIComponent() |
B. | EncodeURI() |
C. | EncodeComponent() |
D. | None of the mentioned |
Answer» B. EncodeURI() | |
208. |
Which of the following is a Boolean cookie attribute? |
A. | Bool |
B. | Secure |
C. | Lookup |
D. | Domain |
Answer» C. Lookup | |
209. |
How can you set a Cookie visibility scope to local Storage? |
A. | / |
B. | % |
C. | * |
D. | All of the mentioned |
Answer» B. % | |
210. |
Which of the following can be used to configure the scope of the Cookie visibility? |
A. | Path |
B. | Domain |
C. | Both Path and Domain |
D. | None of the mentioned |
Answer» E. | |
211. |
Which of the following defines the Cookie visibility? |
A. | Document Path |
B. | LocalStorage |
C. | SessionStorage |
D. | All of the mentioned |
Answer» E. | |
212. |
Which attribute is used to extend the lifetime of a cookie? |
A. | Higherage |
B. | Increaseage |
C. | Maxage |
D. | Lifetime |
Answer» D. Lifetime | |
213. |
Which of the following explains Cookies nature? |
A. | Non Volatile |
B. | Volatile |
C. | Intransient |
D. | Transient |
Answer» E. | |
214. |
The Cookie manipulation is done using which property? |
A. | cookie |
B. | cookies |
C. | manipulate |
D. | none of the mentioned |
Answer» B. cookies | |
215. |
Cookies were originally designed for |
A. | Client side programming |
B. | Server side programming |
C. | Both Client side programming and Server side programming |
D. | None of the mentioned |
Answer» C. Both Client side programming and Server side programming | |
216. |
In Int Address class which method returns the host name of the IP Address? |
A. | Public String get Hostname() |
B. | Public String getHostAddress() |
C. | Public static IntAddress get Localhost() |
D. | None of the mentioned |
Answer» B. Public String getHostAddress() | |
217. |
Which classes are used for connection-less socket programming? |
A. | Datagram Socket |
B. | Datagram Packet |
C. | Both Datagram Socket & Datagram Packet |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
218. |
What does the java.net.InetAddress class represent? |
A. | Socket |
B. | IP Address |
C. | Protocol |
D. | MAC Address |
Answer» C. Protocol | |
219. |
TCP, FTP, Telnet, SMTP, POP etc. are examples of? |
A. | Socket |
B. | IP Address |
C. | Protocol |
D. | MAC Address |
Answer» D. MAC Address | |
220. |
The client in socket programming must know which information? |
A. | IP address of Server |
B. | Port number |
C. | Both IP address of Server & Port number |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
221. |
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number? |
A. | Datagram Socket(int port) |
B. | Datagram Socket(int port, Int Address address) |
C. | Datagram Socket() |
D. | None of the mentioned |
Answer» C. Datagram Socket() | |
222. |
Which methods are commonly used in Server Socket class? |
A. | Public Output Stream get Output Stream () |
B. | Public Socket accept () |
C. | Public synchronized void close () |
D. | None of the mentioned |
Answer» C. Public synchronized void close () | |
223. |
In FTP protocol, client contacts server using _________ as the transport protocol. |
A. | Transmission control protocol |
B. | User datagram protocol |
C. | Datagram congestion control protocol |
D. | Stream control transmission protocol |
Answer» B. User datagram protocol | |
224. |
In the network HTTP resources are located by |
A. | Uniform resource identifier |
B. | Unique resource locator |
C. | Unique resource identifier |
D. | None of the mentioned |
Answer» B. Unique resource locator | |
225. |
Cryptographic hash function takes an arbitrary block of data and returns |
A. | fixed size bit string |
B. | variable size bit string |
C. | both fixed size bit string and variable size bit string |
D. | none of the mentioned |
Answer» B. variable size bit string | |
226. |
ElGamal encryption system is |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | none of the mentioned |
Answer» C. not an encryption algorithm | |
227. |
Voice privacy in GSM cellular telephone protocol is provided by |
A. | A5/2 cipher |
B. | b5/4 cipher |
C. | b5/6 cipher |
D. | b5/8 cipher |
Answer» B. b5/4 cipher | |
228. |
Which one of the following is a cryptographic protocol used to secure HTTP connection? |
A. | stream control transmission protocol (SCTP) |
B. | transport layer security (TSL) |
C. | explicit congestion notification (ECN) |
D. | resource reservation protocol |
Answer» C. explicit congestion notification (ECN) | |
229. |
Cryptanalysis is used |
A. | to find some insecurity in a cryptographic scheme |
B. | to increase the speed |
C. | to encrypt the data |
D. | none of the mentioned |
Answer» B. to increase the speed | |
230. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | none of the mentioned |
Answer» B. stream cipher | |
231. |
In cryptography, the order of the letters in a message is rearranged by |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both transpositional ciphers and substitution ciphers |
D. | none of the mentioned |
Answer» B. substitution ciphers | |
232. |
Which one of the following algorithm is not used in asymmetric-key cryptography? |
A. | rsa algorithm |
B. | diffie-hellman algorithm |
C. | electronic code book algorithm |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
233. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» C. sender and receiver | |
234. |
In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both algorithm for performing encryption and decryption and encrypted message |
D. | none of the mentioned |
Answer» B. encrypted message | |
235. |
Which routing protocol implements the diffusing update algorithm? |
A. | IS-IS |
B. | IGRP |
C. | EIGRP |
D. | OSPF |
Answer» D. OSPF | |
236. |
Which protocol maintains neighbor adjacencies? |
A. | RIPv2 and EIGRP |
B. | IGRP and EIGRP |
C. | RIPv2 |
D. | EIGRP |
Answer» D. EIGRP | |
237. |
What does administrative distance rank? |
A. | Metrics |
B. | Sources of routing information |
C. | Router reliability |
D. | Best paths |
Answer» C. Router reliability | |
238. |
Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains? |
A. | Higher cost of two routers |
B. | Routing feedback |
C. | Cisco IOS incompatibility |
D. | Not possible to use two routers |
Answer» C. Cisco IOS incompatibility | |
239. |
Which two routing protocols can be redistributed into OSPF by a Cisco router? |
A. | IP EIGRP and AppleTalk EIGRP |
B. | AppleTalk EIGRP and RIPv2 |
C. | RIPv2 and IP EIGRP |
D. | IPX RIP & AppleTalk EIGRP |
Answer» D. IPX RIP & AppleTalk EIGRP | |
240. |
Which of the situations might not require require multiple routing protocols in a network? |
A. | When a new Layer 2-only switch is added to the network |
B. | When you are migrating from one routing protocol to another |
C. | When you are using routers from multiple vendors |
D. | When there are host-based routers from multiple vendors |
Answer» B. When you are migrating from one routing protocol to another | |
241. |
Which of the following is true regarding RIPv2? |
A. | It has a lower administrative distance than RIPv1 |
B. | It converges faster than RIPv1 |
C. | It has the same timers as RIPv1 |
D. | It is harder to configure than RIPv1 |
Answer» D. It is harder to configure than RIPv1 | |
242. |
What is route poisoning? |
A. | It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted |
B. | It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing |
C. | It prevents regular update messages from reinstating a route that has just come up |
D. | It describes when a router sets the metric for a downed link to infinity |
Answer» E. | |
243. |
Which statement is true regarding classless routing protocols? |
A. | The use of discontinuous networks is not allowed |
B. | The use of variable length subnet masks is permitted |
C. | RIPv1 is a classless routing protocol |
D. | RIPv2 supports classless routing |
Answer» C. RIPv1 is a classless routing protocol | |
244. |
Where we should use default routing |
A. | On stub networks- which have only one exit path out of the network |
B. | Which have more than one exit path out of the network |
C. | Minimum five exit paths out of the network |
D. | None of the mentioned |
Answer» B. Which have more than one exit path out of the network | |
245. |
Which statement is true regarding classless routing protocol? |
A. | The use of discontinuous networks is not allowed |
B. | Use of variable length subnet masks is permitted |
C. | RIPv1 is a classless routing protocol |
D. | IGRP supports classes routing within the same autonomous system |
Answer» C. RIPv1 is a classless routing protocol | |
246. |
Default administrative distance of RIP |
A. | 0 |
B. | 90 |
C. | 120 |
D. | 130 |
Answer» D. 130 | |
247. |
Which protocol gives a full route table update every 30 seconds? |
A. | IEGRP |
B. | RIP |
C. | both IEGRP and RIP |
D. | none of the mentioned |
Answer» C. both IEGRP and RIP | |
248. |
Default administrative distance of Static Route |
A. | 0 |
B. | 90 |
C. | 100 |
D. | 1 |
Answer» E. | |
249. |
You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean? |
A. | The route is 16 hops away Debug IP rip |
B. | The route has a delay of 16 microseconds Debug IP route |
C. | The route is inaccessible |
D. | The route is queued at 16 messages a second |
Answer» D. The route is queued at 16 messages a second | |
250. |
Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? |
A. | The updated information will be added to the existing routing table Debug IP rip |
B. | The update will be ignored and no further action will occur Debug IP route |
C. | The updated information will replace the existing routing table entry |
D. | The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence |
Answer» C. The updated information will replace the existing routing table entry | |