Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

In classful addressing, a large part of available addresses are ________

A. organized
B. blocked
C. wasted
D. communicated
Answer» D. communicated
2.

First address in a block is used as network address that represents the ________

A. class network
B. entity
C. organization
D. codes
Answer» D. codes
3.

In classless addressing, there are no classes but addresses are still granted in ______

A. ips
B. blocks
C. codes
D. sizes
Answer» C. codes
4.

In IPv4 Addresses, classful addressing is replaced with ________

A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Answer» B. classful addressing
5.

Which field helps to check rearrangement of the fragments?

A. offset
B. flag
C. ttl
D. identifier
Answer» B. flag
6.

Which of the following demerits does Fragmentation have?

A. complicates routers
B. open to dos attack
C. overlapping of fragments.
D. all of the mentioned
Answer» E.
7.

Which of these is not applicable for IP protocol?

A. is connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Answer» C. offer unreliable service
8.

What should be the flag value to indicate the last fragment?

A. 0
B. 1
C. ttl value
D. protocol field value
Answer» B. 1
9.

The data field cannot carry which of the following?

A. tcp segment
B. udp segment
C. icmp messages
D. smtp messages
Answer» D. smtp messages
10.

AJAX stands for _______

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» B. advanced jsp and xml
11.

An alternative to JavaScript on windows platform is _______

A. vbscript
B. asp.net
C. jsp
D. php
Answer» B. asp.net
12.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. scripting language
Answer» B. application programming interface
13.

Which one of the following is not used to generate dynamic web pages?

A. php
B. asp.net
C. jsp
D. css
Answer» E.
14.

URL stands for ________

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» D. unique resource locator
15.

Common gateway interface is used to _______

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Answer» B. generate web pages
16.

In frame relay networks, extended address is used ________

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
17.

Frame relay has only _______

A. physical layer
B. data link layer
C. physical layer and data link layer
D. network layer and data link layer
Answer» D. network layer and data link layer
18.

Virtual circuit identifier in frame relay is called _______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» B. frame relay identifier
19.

Frame relay provides error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
20.

Frame relay has _______

A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» E.
21.

Frame Relay networks offer an option called _______

A. voice over for relay
B. voice over fine relay
C. voice on frame relay
D. voice over frame relay
Answer» E.
22.

What is FRAD in frame relay network?

A. frad assembles and disassembles the frames coming from other protocols
B. frad is used for modulation and demodulation
C. frad is used for error detection
D. frad is used for error recovery
Answer» B. frad is used for modulation and demodulation
23.

Frame Relay is cheaper than other _____

A. lans
B. wans
C. mans
D. multipoint networks
Answer» C. mans
24.

In frame relay networks, extended address is used _______

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
25.

Virtual circuit identifier in frame relay is called ______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» B. frame relay identifier
26.

An ATM cell has the payload field of __________

A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» C. 64 bytes
27.

Frame relay has error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
28.

ATM can be used for ________

A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Answer» E.
29.

ATM standard defines _______ layers.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
30.

In data transfer phase, how many columns does the table contain?

A. 1
B. 2
C. 3
D. 4
Answer» E.
31.

ATM and frame relay are ________

A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Answer» B. datagram networks
32.

Delay of the resource allocated during setup phase during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» D. different for each packet
33.

Delay of the resource allocated on demand during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» E.
34.

ATM uses _______________

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer» C. asynchronous space division multiplexing
35.

Steps required in setup process are ___________

A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
D. setup and termination steps
Answer» B. setup request and setup response
36.

Which of the following is not a phase of virtual circuit network?

A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Answer» D. teardown phase
37.

Which of the following is not a characteristic of Virtual Circuit Network?

A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Answer» E.
38.

Backpressure technique can be applied only to _______

A. congestion networks
B. closed circuit networks
C. open circuit networks
D. virtual circuit networks
Answer» E.
39.

Discarding policy is mainly done by _______

A. sender
B. receiver
C. router
D. switch
Answer» D. switch
40.

In open-loop control, policies are applied to __________

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» D. prevent before sending packets
41.

Closed-Loop control mechanisms try to _________

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» B. remove after sometime
42.

ESP does not provide ________

A. source authentication
B. data integrity
C. privacy
D. error control
Answer» E.
43.

IPsec defines two protocols: _______ and ________

A. ah; ssl
B. pgp; esp
C. ah; esp
D. pgp; ssl
Answer» D. pgp; ssl
44.

The ______ field is used to detect errors over the entire user datagram.

A. udp header
B. checksum
C. source port
D. destination port
Answer» C. source port
45.

Which is the correct expression for the length of UDP datagram?

A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» B. udp length = udp length – udp header’s length
46.

“Total length” field in UDP packet header is the length of _________

A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer» E.
47.

What is the header size of a UDP packet?

A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» B. 8 bits
48.

Port number used by Network Time Protocol (NTP) with UDP is ________

A. 161
B. 123
C. 162
D. 124
Answer» C. 162
49.

The port number is “ephemeral port number”, if the source host is _______

A. ntp
B. echo
C. server
D. client
Answer» E.
50.

What is the main advantage of UDP?

A. more overload
B. reliable
C. low overhead
D. fast
Answer» D. fast