Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

401.

IP Security operates in which layer of the OSI model?

A. Network
B. Transport
C. Application
D. Physical
Answer» B. Transport
402.

IPsec defines two protocols: _______ and ________

A. AH; SSL
B. PGP; ESP
C. AH; ESP
D. All of the mentioned
Answer» D. All of the mentioned
403.

______ provides authentication at the IP level.

A. AH
B. ESP
C. PGP
D. SSL
Answer» B. ESP
404.

Which two types of IPsec can be used to secure communications between two LANs?

A. AH tunnel mode
B. ESP tunnel mode
C. Both AH tunnel mode and ESP tunnel mode
D. ESP transport mode
Answer» D. ESP transport mode
405.

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

A. Kerberos V5
B. SHA
C. MD5
D. Both SHA and MD5
Answer» E.
406.

Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?

A. AH transport mode
B. ESP transport mode
C. ESP tunnel mode
D. AH tunnel mode
Answer» C. ESP tunnel mode
407.

Correct expression for UDP user datagram length is

A. UDP length = IP length – IP header’s length
B. UDP length = UDP length – UDP header’s length
C. UDP length = IP length + IP header’s length
D. UDP length = UDP length + UDP header’s length
Answer» B. UDP length = UDP length – UDP header’s length
408.

“Total length” field in UDP packet header is the length of

A. Only UDP header
B. Only data
C. Only checksum
D. UDP header plus data
Answer» E.
409.

The port number is “ephemeral port number”, if the source host is ……

A. NTP
B. Echo
C. Server
D. Client
Answer» E.
410.

what is the header size of UDP packet?

A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» B. 8 bits
411.

Port number used by Network Time Protocol(NTP) with UDP is

A. 161
B. 123
C. 162
D. 124
Answer» C. 162
412.

The main advantage of UDP is

A. More overload
B. Reliable
C. Less overload
D. Fast
Answer» D. Fast
413.

Beyond IP, TCP provides additional services such as

A. Routing and switching
B. Sending and receiving of packets
C. Multiplexing and demultiplexing
D. Demultiplexing and error checking
Answer» E.
414.

Return value of the UDP port “Chargen” is

A. String of characters
B. String of integers
C. Array of characters with integers
D. Array of zero’s and one’s
Answer» B. String of integers
415.

Which of the following is false with respect to UDP

A. Connection-oriented
B. Unreliable
C. Transport layer protocol
D. All of the mentioned
Answer» B. Unreliable
416.

Size of source and destination port address of TCP header respectively are

A. 16-bits and 32-bits
B. 16-bits and 16-bits
C. 32-bits and 16-bits
D. 32-bits and 32-bits
Answer» C. 32-bits and 16-bits
417.

SYNC flooding attack belongs to a type of security attack known as

A. SYNC flooding attack
B. Active attack
C. Passive attack
D. Denial-of-service attack
Answer» E.
418.

The situation when a malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagrams

A. SYNC flooding attack
B. Active attack
C. Passive attack
D. Denial-of-service attack
Answer» B. Active attack
419.

In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is

A. Mutual open
B. Mutual Close
C. Simultaneous open
D. Simultaneous close
Answer» D. Simultaneous close
420.

The process of, A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server is

A. Active open
B. Active close
C. Passive close
D. Passive open
Answer» B. Active close
421.

The server program tells its TCP that it is ready to accept a connection. This process is called

A. Active open
B. Active close
C. Passive close
D. Passive open
Answer» E.
422.

Connection establishment in TCP is done by which mechanism?

A. Flow control
B. Three-Way Handshaking
C. Forwarding
D. Synchronisation
Answer» C. Forwarding
423.

Size of TCP segment header ranges between

A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 20 and 60 bits
Answer» D. 20 and 60 bits
424.

The receiver of the data controls the amount of data that are to be sent by the sender is referred as

A. Flow control
B. Error control
C. Congestion control
D. Error detection
Answer» B. Error control
425.

The value of acknowledgement field in a segment defines

A. Number of previous bytes to receive
B. Total number of bytes to receive
C. Number of next bytes to receive
D. Sequence of zero’s and one’s
Answer» D. Sequence of zero’s and one’s
426.

Bytes of data being transferred in each connection are numbered by TCP. These numbers starts with a

A. Random number
B. Zero
C. One
D. Sequence of zero’s and one’s
Answer» E.
427.

Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment.

A. 10000
B. 10001
C. 12001
D. 11001
Answer» C. 12001
428.

In segment header, sequence number and acknowledgement number field refers to

A. Byte number
B. Buffer number
C. Segment number
D. Acknowledgment
Answer» B. Buffer number
429.

To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.

A. Packet
B. Buffer
C. Segment
D. Acknowledgment
Answer» E.
430.

Communication offered by TCP is

A. Full-duplex
B. Half-duplex
C. Semi-duplex
D. Byte by byte
Answer» B. Half-duplex
431.

TCP groups a number of bytes together into a packet called

A. Packet
B. Buffer
C. Segment
D. Stack
Answer» D. Stack
432.

TCP process may not write and read data at the same speed. So we need __________ for storage.

A. Packets
B. Buffers
C. Segments
D. Stacks
Answer» C. Segments
433.

In TCP, sending and receiving data is done as

A. Stream of bytes
B. Sequence of characters
C. Lines of data
D. Packets
Answer» B. Sequence of characters
434.

Which of the following is true with respect to TCP

A. Connection-oriented
B. Process-to-process
C. Transport layer protocol
D. All of the mentioned
Answer» E.
435.

In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in

A. default mode
B. character mode
C. server mode
D. none of the mentioned
Answer» B. character mode
436.

In character mode operation of telnet implementation

A. each character typed is sent by the client to the server
B. each character typed is discarded by the server
C. each character typed is aggregated into a word and then send to the server
D. none of the mentioned
Answer» B. each character typed is discarded by the server
437.

The decimal code of interpret as command (IAC) character is

A. 252
B. 253
C. 254
D. 255
Answer» E.
438.

AbsoluteTelnet is a telnet client for

A. windows
B. linux
C. mac
D. none of the mentioned
Answer» B. linux
439.

All telnet operations are sent as

A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 32 bytes
Answer» C. 16 bytes
440.

Telnet protocol is used to establish a connection to

A. TCP port number 21
B. TCP port number 22
C. TCP port number 23
D. TCP port number 24
Answer» D. TCP port number 24
441.

If we want that a character be interpreted by the client instead of server

A. escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. none of the mentioned
Answer» B. control functions has to be disabled
442.

Which operating mode of telnet is full duplex?

A. default mode
B. server mode
C. line mode
D. none of the mentioned
Answer» D. none of the mentioned
443.

Telnet is a

A. Television on net
B. Network of Telephones
C. Remote Login
D. Teleshopping site
Answer» D. Teleshopping site
444.

_______ allows you to connect and login to a remote computer

A. Telnet
B. FTP
C. HTTP
D. None of the mentioned
Answer» B. FTP
445.

In “character at a time” mode

A. Character processing is done on the local system under the control of the remote system
B. Most text typed is immediately sent to the remote host for processing
C. All text is echoed locally, only completed lines are sent to the remote host
D. None of the mentioned
Answer» C. All text is echoed locally, only completed lines are sent to the remote host
446.

The protocol used by Telnet application is

A. Telnet
B. FTP
C. HTTP
D. None of the mentioned
Answer» B. FTP
447.

Structure of Management Information (SMI), is guideline of

A. HTTP
B. SNMP
C. URL
D. MIB
Answer» C. URL
448.

SNMP is a framework for managing devices in an internet using the

A. TCP/IP protocol
B. UDP
C. SMTP
D. None
Answer» B. UDP
449.

Control of users’ access to network resources through charges are main responsibilities of

A. Reactive Fault Management
B. Reconfigured Fault Management
C. Accounting Management
D. Security Management
Answer» D. Security Management
450.

BER stands for

A. Basic Encoding Rules
B. Basic Encoding Resolver
C. Basic Encoding Rotator
D. Basic Encoding Router
Answer» B. Basic Encoding Resolver