Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

301.

Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.

A. Half-trip time
B. Round-trip time
C. Travel time for the next router
D. Time to reach the destination/source
Answer» C. Travel time for the next router
302.

In case of time exceeded error, when the datagram visits a router, the value of time to live field is

A. Remains constant
B. Decremented by 2
C. Incremented by 1
D. Decremented by 1
Answer» E.
303.

The source-quench message in ICMP was designed to add a kind of ____________ to the IP

A. Error control
B. Flow control
C. Router control
D. None of the mentioned
Answer» C. Router control
304.

When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.

A. Destination unreachable
B. Source quench
C. Router error
D. Time exceeded
Answer» B. Source quench
305.

ICMP error message will not be generated for a datagram having a special address such as

A. 127.0.0.0
B. 12.1.2
C. 11.1
D. 127
Answer» B. 12.1.2
306.

Which of these is not a type of error-reporting messages

A. Destination unreachable
B. Source quench
C. Router error
D. Time exceeded
Answer» D. Time exceeded
307.

During error reporting, ICMP always reports error messages to

A. Destination
B. Source
C. Next router
D. Previous router
Answer» C. Next router
308.

Header size of the ICMP message is

A. 8-bytes
B. 8-bits
C. 16-bytes
D. 16-bits
Answer» B. 8-bits
309.

Internet Control Message Protocol(ICMP) has designed to compensate

A. Error-reporting
B. Error-correction
C. Host and management queries
D. All of the mentioned
Answer» E.
310.

The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as

A. Delivery of packets
B. Error correction
C. Multiplexing
D. Demultiplexing
Answer» E.
311.

In transport layer, Multiplexing is done at

A. Channel
B. Receiver site
C. Sender site
D. Packet
Answer» D. Packet
312.

Correct order in the process of Connection-Oriented services is 1. Data transfer 2. Connection release 3. Connection establishment

A. 1-2-3
B. 3-2-1
C. 2-1-3
D. 3-1-2
Answer» E.
313.

Which of the following is false with respect to Connectionless service of transport layer protocol?

A. Packets are not numbered
B. Packets are not delayed
C. No acknowledgement
D. Packet may arrive out of sequence
Answer» C. No acknowledgement
314.

The combination of an IP address and port number is called as?

A. Socket address
B. Port address
C. MAC address
D. Host address
Answer» B. Port address
315.

According to Internet Assigned Numbers Authority(IANA), which of the following range is not part of port number?

A. Well-known ports
B. Registered ports
C. Dynamic ports
D. Static ports
Answer» E.
316.

Range of port numbers in Internet model is

A. 0 and 32,765(8-bit)
B. 0 and 32,765(16-bit)
C. 0 and 65,535(32-bit)
D. 0 and 65,535(16-bit)
Answer» E.
317.

Multiple processes on destinations at transport layer are identified by:

A. Mac address
B. Port number
C. Host number
D. Host address
Answer» C. Host number
318.

In process-to-process delivery, two processes communicate in which of the following methods?

A. Client/Server
B. Source/Destination
C. Message Transfer
D. None of the mentioned
Answer» B. Source/Destination
319.

Which layer is responsible for process-to-process delivery?

A. Physical layer
B. Network layer
C. Transport layer
D. Application layer
Answer» D. Application layer
320.

When IPV6 launched

A. June 2, 2012
B. June 4, 2012
C. June 5, 2012
D. June 6, 2012
Answer» E.
321.

Which statement(s) about IPv6 addresses are true?

A. Leading zeros are required
B. Two colons (::) are used to represent successive hexadecimal fields of zeros
C. Two colons (::) are used to separate fields
D. A single interface cannot have multiple IPv6 addresses of different types
Answer» C. Two colons (::) are used to separate fields
322.

In IPv6 addresses, addresses start with eight 0s are called

A. Unicast addresses
B. Multicast addresses
C. Any cast addresses
D. Reserved addresses
Answer» E.
323.

A few leftmost bits in each address of IPv6 address define its category is called

A. Prefix type
B. Postfix type
C. Reserved type
D. Local type
Answer» B. Postfix type
324.

In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called

A. Unspecified address
B. Loopback address
C. Compatible address
D. Mapped address
Answer» C. Compatible address
325.

A link local address of local addresses is used in an

A. Isolated router
B. Isolated mask
C. Isolated subnet
D. Isolated net
Answer» D. Isolated net
326.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits

A. 96 to 127
B. 0 to 63
C. 80 to 95
D. 64 to 79
Answer» B. 0 to 63
327.

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

A. Use dual-stack approach
B. Tunneling
C. No solution
D. Replace the system
Answer» C. No solution
328.

Dual-stack approach refers to

A. Implementing Ipv4 with 2 stacks
B. Implementing Ipv6 with 2 stacks
C. Node has both IPv4 and IPv6 support
D. None of the mentioned
Answer» D. None of the mentioned
329.

The _________ field determines the lifetime of IPv6 datagram

A. Hop limit
B. TTL
C. Next header
D. None of the mentioned
Answer» B. TTL
330.

These are the features present in IPv4 but not in IPv6.

A. Fragmentation
B. Header checksum
C. Options
D. All of the mentioned
Answer» E.
331.

IPv6 doesnot use _________ type of address

A. Broadcast
B. Multicast
C. Anycast
D. None of the mentioned
Answer» B. Multicast
332.

In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?

A. Fragmentation field
B. Fast-switching
C. ToS field
D. Option field
Answer» D. Option field
333.

The header length of an IPv6 datagram is ___________

A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» E.
334.

The size of IP address in IPv6 is

A. 4bytes
B. 128bits
C. 8bytes
D. 100bits
Answer» C. 8bytes
335.

Which of this is not a class of IP address?

A. ClassE
B. ClassC
C. ClassD
D. ClassF
Answer» E.
336.

Network addresses are very important concepts of

A. Routing
B. Mask
C. IP Addressing
D. Classless Addressing
Answer» D. Classless Addressing
337.

In classful addressing, a large part of available addresses are

A. Organized
B. Blocked
C. Wasted
D. Communicated
Answer» D. Communicated
338.

First address in a block is used as network address that represents the

A. Class Network
B. Entity
C. Organization
D. Codes
Answer» D. Codes
339.

In IPv4 Addresses, classful addressing is replaced with

A. Classless Addressing
B. Classful Addressing
C. Classful Advertising
D. Classless Advertising
Answer» B. Classful Addressing
340.

n classless addressing, there are no classes but addresses are still granted in

A. IPs
B. Blocks
C. Codes
D. Sizes
Answer» C. Codes
341.

Which field helps to check rearrangement of the fragments?

A. offset
B. flag
C. ttl
D. identifer
Answer» B. flag
342.

Fragmentation has following demerits

A. complicates routers
B. open to DOS attack
C. overlapping of fragments.
D. all of the mentioned
Answer» E.
343.

Which of these is not applicable for IP protocol?

A. is connectionless
B. offer reliable service
C. offer unreliable service
D. none of the mentioned
Answer» C. offer unreliable service
344.

What should be the flag value to indicate the last fragment?

A. 0
B. 1
C. TTl value
D. None of the mentioned
Answer» B. 1
345.

The data field can carry which of the following?

A. TCP segemnt
B. UDP segment
C. ICMP messages
D. None of the mentioned
Answer» D. None of the mentioned
346.

If the value in protocol field is 17, the transport layer protocol used is _____________

A. TCP
B. UDP
C. Either of the mentioned
D. None of the mentioned
Answer» C. Either of the mentioned
347.

The TTL field has value 10. How many routers (max) can process this datagram?

A. 11
B. 5
C. 10
D. 1
Answer» D. 1
348.

Which of the following field in IPv4 datagram is not related to fragmentation?

A. Flags
B. Offset
C. TOS
D. Identifier
Answer» D. Identifier
349.

Which of the following is not applicable for IP?

A. Error reporting
B. Handle addressing conventions
C. Datagram format
D. Packet handling conventions
Answer» B. Handle addressing conventions
350.

AJAX stands for

A. asynchronous javascript and xml
B. advanced JSP and xml
C. asynchronous JSP and xml
D. advanced javascript and xml
Answer» B. advanced JSP and xml