MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
A network management system can be divided into ___________ |
| A. | three categories |
| B. | five broad categories |
| C. | seven broad categories |
| D. | ten broad categories |
| Answer» C. seven broad categories | |
| 152. |
MIB is a collection of groups of objects that can be managed by __________ |
| A. | smtp |
| B. | udp |
| C. | snmp |
| D. | tcp/ip |
| Answer» D. tcp/ip | |
| 153. |
Which of the following networks supports pipelining effect? |
| A. | circuit-switched networks |
| B. | message-switched networks |
| C. | packet-switched networks |
| D. | stream-switched networks |
| Answer» D. stream-switched networks | |
| 154. |
Performance management is closely related to _________ |
| A. | proactive fault management |
| B. | fault management |
| C. | reactive fault management |
| D. | preventive fault management |
| Answer» C. reactive fault management | |
| 155. |
A stateful firewall maintains a ___________ which is a list of active connections. |
| A. | routing table |
| B. | bridging table |
| C. | state table |
| D. | connection table |
| Answer» B. bridging table | |
| 156. |
A packet filter firewall filters at __________ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer or transport layer |
| D. | application layer |
| Answer» D. application layer | |
| 157. |
A proxy firewall filters at _________ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | application layer |
| Answer» E. | |
| 158. |
Which of the following is / are the types of firewall? |
| A. | packet filtering firewall |
| B. | dual homed gateway firewall |
| C. | screen host firewall |
| D. | dual host firewall |
| Answer» B. dual homed gateway firewall | |
| 159. |
Network layer firewall has two sub-categories as _________ |
| A. | state full firewall and stateless firewall |
| B. | bit oriented firewall and byte oriented firewall |
| C. | frame firewall and packet firewall |
| D. | network layer firewall and session layer firewall |
| Answer» B. bit oriented firewall and byte oriented firewall | |
| 160. |
Which of the following is false with respect to the datagram networks? |
| A. | number of flows of packets are not limited |
| B. | packets may not be in order at the destination |
| C. | path is not reserved |
| D. | delay is the same for all packets in a flow |
| Answer» E. | |
| 161. |
Network layer firewall works as a __________ |
| A. | frame filter |
| B. | packet filter |
| C. | content filter |
| D. | virus filter |
| Answer» C. content filter | |
| 162. |
Datagrams are routed to their destinations with the help of ________ |
| A. | switch table |
| B. | segments table |
| C. | datagram table |
| D. | routing table |
| Answer» D. routing table | |
| 163. |
Packets in datagram switching are referred to as ________ |
| A. | switches |
| B. | segments |
| C. | datagrams |
| D. | data-packets |
| Answer» D. data-packets | |
| 164. |
Which of the following is true with respect to the delay in datagram networks? |
| A. | delay is greater than in a virtual circuit network |
| B. | each packet may experience a wait at a switch |
| C. | delay is not uniform for the packets of a message |
| D. | all of the mentioned |
| Answer» E. | |
| 165. |
Which OSPF show command describes a list of OSPF adjacencies? |
| A. | show ip ospf interface |
| B. | show ip ospf |
| C. | show ip route |
| D. | show ip ospf neighbor |
| Answer» E. | |
| 166. |
Which two commands are required for basic OSPF configuration? |
| A. | “[network mask] area [area-id]†and “router ospf [process-id]†|
| B. | “[wildcard-mask] area [area-id]†and “[network mask] area [area-id]†|
| C. | only “router ospf [process-id]†|
| D. | “[wildcard-mask] area [area-id]†and “router ospf [process-id]†|
| Answer» E. | |
| 167. |
Which field is NOT a field within an OSPF packet header? |
| A. | packet length |
| B. | router id |
| C. | authentication type |
| D. | maxage time |
| Answer» E. | |
| 168. |
At which interval does OSPF refresh LSAs? |
| A. | 10 seconds |
| B. | 30 seconds |
| C. | 30 minutes |
| D. | 1 hour |
| Answer» E. | |
| 169. |
The outcome of Dijkstra’s calculation is used to populate the __________ |
| A. | topology table |
| B. | routing table |
| C. | neighbor table |
| D. | adjacency table |
| Answer» C. neighbor table | |
| 170. |
In OSPF header, which field is used to detect errors in the packet? |
| A. | type |
| B. | area id |
| C. | authentication type |
| D. | checksum |
| Answer» E. | |
| 171. |
In OSPF, which protocol is used to discover neighbour routers automatically? |
| A. | link state protocol |
| B. | error-correction protocol |
| C. | routing information protocol |
| D. | hello protocol |
| Answer» E. | |
| 172. |
Which of the following is not a type of OSPF packet? |
| A. | hello |
| B. | link-state request |
| C. | link-state response |
| D. | link-state ack |
| Answer» D. link-state ack | |
| 173. |
Open Shortest Path First (OSPF) is also called as _____________ |
| A. | link state protocol |
| B. | error-correction protocol |
| C. | routing information protocol |
| D. | border gateway protocol |
| Answer» B. error-correction protocol | |
| 174. |
The computation of the shortest path in OSPF is usually done by ____________ |
| A. | bellman-ford algorithm |
| B. | routing information protocol |
| C. | dijkstra’s algorithm |
| D. | distance vector routing |
| Answer» D. distance vector routing | |
| 175. |
Network layer firewall has two sub-categories called ____________ |
| A. | stateful firewall and stateless firewall |
| B. | bit oriented firewall and byte oriented firewall |
| C. | frame firewall and packet firewall |
| D. | network firewall and data firewall |
| Answer» B. bit oriented firewall and byte oriented firewall | |
| 176. |
Network layer firewall works as a ________ |
| A. | frame filter |
| B. | packet filter |
| C. | signal filter |
| D. | content filter |
| Answer» C. signal filter | |
| 177. |
LSP stands for __________ |
| A. | link stable packet |
| B. | link state packet |
| C. | link state protocol |
| D. | link state path |
| Answer» C. link state protocol | |
| 178. |
RPF stands for __________ |
| A. | reverse path forwarding |
| B. | reverse path failure |
| C. | reverse packet forwarding |
| D. | reverse protocol failure |
| Answer» B. reverse path failure | |
| 179. |
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________ |
| A. | graph |
| B. | tree |
| C. | network |
| D. | link |
| Answer» B. tree | |
| 180. |
Next-Hop Method is used to reduce contents of a _________ |
| A. | revolving table |
| B. | rotating table |
| C. | routing table |
| D. | re-allocate table |
| Answer» D. re-allocate table | |
| 181. |
Which of the following HTTP methods should be idempotent in nature? |
| A. | options |
| B. | delete |
| C. | post |
| D. | head |
| Answer» C. post | |
| 182. |
What is the constraint on the data per cookie? |
| A. | 2 kb |
| B. | 1 kb |
| C. | 4 kb |
| D. | 3 kb |
| Answer» D. 3 kb | |
| 183. |
Which of the following is a Boolean cookie attribute? |
| A. | bool |
| B. | secure |
| C. | lookup |
| D. | domain |
| Answer» C. lookup | |
| 184. |
What does REST stand for? |
| A. | represent state transfer |
| B. | representational state transfer |
| C. | representing state transfer |
| D. | representation state transfer |
| Answer» C. representing state transfer | |
| 185. |
How can you set a Cookie visibility scope to local Storage? |
| A. | / |
| B. | % |
| C. | * |
| D. | # |
| Answer» B. % | |
| 186. |
Which of the following defines the Cookie visibility? |
| A. | document path |
| B. | localstorage |
| C. | sessionstorage |
| D. | all of the mentioned |
| Answer» E. | |
| 187. |
Which attribute is used to extend the lifetime of a cookie? |
| A. | higher-age |
| B. | increase-age |
| C. | max-age |
| D. | lifetime |
| Answer» D. lifetime | |
| 188. |
Which of the following can be used to configure the scope of the Cookie visibility? |
| A. | path |
| B. | domain |
| C. | both path and domain |
| D. | server |
| Answer» E. | |
| 189. |
Which of the following explains Cookies nature? |
| A. | non volatile |
| B. | volatile |
| C. | intransient |
| D. | transient |
| Answer» E. | |
| 190. |
The Cookie manipulation is done using which property? |
| A. | cookie |
| B. | cookies |
| C. | manipulate |
| D. | manipulate cookie |
| Answer» B. cookies | |
| 191. |
Which classes are used for connection-less socket programming? |
| A. | datagram socket |
| B. | datagram packet |
| C. | both datagram socket & datagram packet |
| D. | server socket |
| Answer» D. server socket | |
| 192. |
Cookies were originally designed for ____________ |
| A. | client side programming |
| B. | server side programming |
| C. | both client side programming and server side programming |
| D. | socket programming |
| Answer» C. both client side programming and server side programming | |
| 193. |
In Inet Address class, which method returns the host name of the IP Address? |
| A. | public string get hostname() |
| B. | public string gethostaddress() |
| C. | public static inetaddress get localhost() |
| D. | public getbyname() |
| Answer» B. public string gethostaddress() | |
| 194. |
TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________ |
| A. | socket |
| B. | ip address |
| C. | protocol |
| D. | mac address |
| Answer» D. mac address | |
| 195. |
The client in socket programming must know which information? |
| A. | ip address of server |
| B. | port number |
| C. | both ip address of server & port number |
| D. | only its own ip address |
| Answer» D. only its own ip address | |
| 196. |
In File Transfer Protocol, data transfer cannot be done in __________ |
| A. | stream mode |
| B. | block mode |
| C. | compressed mode |
| D. | message mode |
| Answer» E. | |
| 197. |
The File Transfer Protocol is built on __________ |
| A. | data centric architecture |
| B. | service oriented architecture |
| C. | client server architecture |
| D. | connection oriented architecture |
| Answer» D. connection oriented architecture | |
| 198. |
In FTP protocol, a client contacts a server using ______ as the transport protocol. |
| A. | transmission control protocol |
| B. | user datagram protocol |
| C. | datagram congestion control protocol |
| D. | stream control transmission protocol |
| Answer» B. user datagram protocol | |
| 199. |
FTP server listens for connection on which port number? |
| A. | 20 |
| B. | 21 |
| C. | 22 |
| D. | 23 |
| Answer» C. 22 | |
| 200. |
In the network HTTP resources are located by __________ |
| A. | uniform resource identifier |
| B. | unique resource locator |
| C. | unique resource identifier |
| D. | union resource locator |
| Answer» B. unique resource locator | |