MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
In classful addressing, a large part of available addresses are ________ |
| A. | organized |
| B. | blocked |
| C. | wasted |
| D. | communicated |
| Answer» D. communicated | |
| 252. |
First address in a block is used as network address that represents the ________ |
| A. | class network |
| B. | entity |
| C. | organization |
| D. | codes |
| Answer» D. codes | |
| 253. |
In classless addressing, there are no classes but addresses are still granted in ______ |
| A. | ips |
| B. | blocks |
| C. | codes |
| D. | sizes |
| Answer» C. codes | |
| 254. |
In IPv4 Addresses, classful addressing is replaced with ________ |
| A. | classless addressing |
| B. | classful addressing |
| C. | classful advertising |
| D. | classless advertising |
| Answer» B. classful addressing | |
| 255. |
Which field helps to check rearrangement of the fragments? |
| A. | offset |
| B. | flag |
| C. | ttl |
| D. | identifier |
| Answer» B. flag | |
| 256. |
Which of the following demerits does Fragmentation have? |
| A. | complicates routers |
| B. | open to dos attack |
| C. | overlapping of fragments. |
| D. | all of the mentioned |
| Answer» E. | |
| 257. |
Which of these is not applicable for IP protocol? |
| A. | is connectionless |
| B. | offer reliable service |
| C. | offer unreliable service |
| D. | does not offer error reporting |
| Answer» C. offer unreliable service | |
| 258. |
What should be the flag value to indicate the last fragment? |
| A. | 0 |
| B. | 1 |
| C. | ttl value |
| D. | protocol field value |
| Answer» B. 1 | |
| 259. |
The data field cannot carry which of the following? |
| A. | tcp segment |
| B. | udp segment |
| C. | icmp messages |
| D. | smtp messages |
| Answer» D. smtp messages | |
| 260. |
AJAX stands for _______ |
| A. | asynchronous javascript and xml |
| B. | advanced jsp and xml |
| C. | asynchronous jsp and xml |
| D. | advanced javascript and xml |
| Answer» B. advanced jsp and xml | |
| 261. |
An alternative to JavaScript on windows platform is _______ |
| A. | vbscript |
| B. | asp.net |
| C. | jsp |
| D. | php |
| Answer» B. asp.net | |
| 262. |
What is document object model (DOM)? |
| A. | convention for representing and interacting with objects in html documents |
| B. | application programming interface |
| C. | hierarchy of objects in asp.net |
| D. | scripting language |
| Answer» B. application programming interface | |
| 263. |
Which one of the following is not used to generate dynamic web pages? |
| A. | php |
| B. | asp.net |
| C. | jsp |
| D. | css |
| Answer» E. | |
| 264. |
URL stands for ________ |
| A. | unique reference label |
| B. | uniform reference label |
| C. | uniform resource locator |
| D. | unique resource locator |
| Answer» D. unique resource locator | |
| 265. |
Common gateway interface is used to _______ |
| A. | generate executable files from web content by web server |
| B. | generate web pages |
| C. | stream videos |
| D. | download media files |
| Answer» B. generate web pages | |
| 266. |
In frame relay networks, extended address is used ________ |
| A. | to increase the range of data link connection identifiers |
| B. | for error detection |
| C. | for encryption |
| D. | for error recovery |
| Answer» B. for error detection | |
| 267. |
Frame relay has only _______ |
| A. | physical layer |
| B. | data link layer |
| C. | physical layer and data link layer |
| D. | network layer and data link layer |
| Answer» D. network layer and data link layer | |
| 268. |
Virtual circuit identifier in frame relay is called _______ |
| A. | data link connection identifier |
| B. | frame relay identifier |
| C. | cell relay identifier |
| D. | circuit connection identifier |
| Answer» B. frame relay identifier | |
| 269. |
Frame relay provides error detection at the ______ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | transport layer |
| Answer» C. network layer | |
| 270. |
Frame relay has _______ |
| A. | only physical layer |
| B. | only data link layer |
| C. | only network layer |
| D. | both physical and data link layer |
| Answer» E. | |
| 271. |
Frame Relay networks offer an option called _______ |
| A. | voice over for relay |
| B. | voice over fine relay |
| C. | voice on frame relay |
| D. | voice over frame relay |
| Answer» E. | |
| 272. |
What is FRAD in frame relay network? |
| A. | frad assembles and disassembles the frames coming from other protocols |
| B. | frad is used for modulation and demodulation |
| C. | frad is used for error detection |
| D. | frad is used for error recovery |
| Answer» B. frad is used for modulation and demodulation | |
| 273. |
Frame Relay is cheaper than other _____ |
| A. | lans |
| B. | wans |
| C. | mans |
| D. | multipoint networks |
| Answer» C. mans | |
| 274. |
In frame relay networks, extended address is used _______ |
| A. | to increase the range of data link connection identifiers |
| B. | for error detection |
| C. | for encryption |
| D. | for error recovery |
| Answer» B. for error detection | |
| 275. |
Virtual circuit identifier in frame relay is called ______ |
| A. | data link connection identifier |
| B. | frame relay identifier |
| C. | cell relay identifier |
| D. | circuit connection identifier |
| Answer» B. frame relay identifier | |
| 276. |
An ATM cell has the payload field of __________ |
| A. | 32 bytes |
| B. | 48 bytes |
| C. | 64 bytes |
| D. | 128 bytes |
| Answer» C. 64 bytes | |
| 277. |
Frame relay has error detection at the ______ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | transport layer |
| Answer» C. network layer | |
| 278. |
ATM can be used for ________ |
| A. | local area network |
| B. | wide area network |
| C. | campus area network |
| D. | networks covering any range |
| Answer» E. | |
| 279. |
ATM standard defines _______ layers. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |
| 280. |
In data transfer phase, how many columns does the table contain? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» E. | |
| 281. |
ATM and frame relay are ________ |
| A. | virtual circuit networks |
| B. | datagram networks |
| C. | virtual private networks |
| D. | virtual public networks |
| Answer» B. datagram networks | |
| 282. |
Delay of the resource allocated during setup phase during data transfer is ________ |
| A. | constant |
| B. | increases for each packet |
| C. | same for each packet |
| D. | different for each packet |
| Answer» D. different for each packet | |
| 283. |
Delay of the resource allocated on demand during data transfer is ________ |
| A. | constant |
| B. | increases for each packet |
| C. | same for each packet |
| D. | different for each packet |
| Answer» E. | |
| 284. |
ATM uses _______________ |
| A. | asynchronous frequency division multiplexing |
| B. | asynchronous time division multiplexing |
| C. | asynchronous space division multiplexing |
| D. | asynchronous amplitude division multiplexing |
| Answer» C. asynchronous space division multiplexing | |
| 285. |
Steps required in setup process are ___________ |
| A. | setup request and acknowledgement |
| B. | setup request and setup response |
| C. | setup request and setup termination |
| D. | setup and termination steps |
| Answer» B. setup request and setup response | |
| 286. |
Which of the following is not a phase of virtual circuit network? |
| A. | setup phase |
| B. | data transfer phase |
| C. | termination phase |
| D. | teardown phase |
| Answer» D. teardown phase | |
| 287. |
Which of the following is not a characteristic of Virtual Circuit Network? |
| A. | there are setup and teardown phases in addition to the data transfer phase |
| B. | resources can be allocated during setup phase or on demand |
| C. | all packets follow the same path established during the connection |
| D. | virtual circuit network is implemented in application layer |
| Answer» E. | |
| 288. |
Backpressure technique can be applied only to _______ |
| A. | congestion networks |
| B. | closed circuit networks |
| C. | open circuit networks |
| D. | virtual circuit networks |
| Answer» E. | |
| 289. |
Discarding policy is mainly done by _______ |
| A. | sender |
| B. | receiver |
| C. | router |
| D. | switch |
| Answer» D. switch | |
| 290. |
In open-loop control, policies are applied to __________ |
| A. | remove after congestion occurs |
| B. | remove after sometime |
| C. | prevent before congestion occurs |
| D. | prevent before sending packets |
| Answer» D. prevent before sending packets | |
| 291. |
Closed-Loop control mechanisms try to _________ |
| A. | remove after congestion occurs |
| B. | remove after sometime |
| C. | prevent before congestion occurs |
| D. | prevent before sending packets |
| Answer» B. remove after sometime | |
| 292. |
ESP does not provide ________ |
| A. | source authentication |
| B. | data integrity |
| C. | privacy |
| D. | error control |
| Answer» E. | |
| 293. |
IPsec defines two protocols: _______ and ________ |
| A. | ah; ssl |
| B. | pgp; esp |
| C. | ah; esp |
| D. | pgp; ssl |
| Answer» D. pgp; ssl | |
| 294. |
The ______ field is used to detect errors over the entire user datagram. |
| A. | udp header |
| B. | checksum |
| C. | source port |
| D. | destination port |
| Answer» C. source port | |
| 295. |
Which is the correct expression for the length of UDP datagram? |
| A. | udp length = ip length – ip header’s length |
| B. | udp length = udp length – udp header’s length |
| C. | udp length = ip length + ip header’s length |
| D. | udp length = udp length + udp header’s length |
| Answer» B. udp length = udp length – udp header’s length | |
| 296. |
“Total length†field in UDP packet header is the length of _________ |
| A. | only udp header |
| B. | only data |
| C. | only checksum |
| D. | udp header plus data |
| Answer» E. | |
| 297. |
What is the header size of a UDP packet? |
| A. | 8 bytes |
| B. | 8 bits |
| C. | 16 bytes |
| D. | 124 bytes |
| Answer» B. 8 bits | |
| 298. |
Port number used by Network Time Protocol (NTP) with UDP is ________ |
| A. | 161 |
| B. | 123 |
| C. | 162 |
| D. | 124 |
| Answer» C. 162 | |
| 299. |
The port number is “ephemeral port numberâ€, if the source host is _______ |
| A. | ntp |
| B. | echo |
| C. | server |
| D. | client |
| Answer» E. | |
| 300. |
What is the main advantage of UDP? |
| A. | more overload |
| B. | reliable |
| C. | low overhead |
| D. | fast |
| Answer» D. fast | |