

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
401. |
The size of an IP address in IPv6 is _________ |
A. | 32 bits |
B. | 64 bits |
C. | 128 bits |
D. | 265 bits |
Answer» D. 265 bits | |
402. |
Which of the following below is/are the capability of ICMP protocol? |
A. | Report package count |
B. | Report network congestion |
C. | Both band d |
D. | Report availability of remote hosts |
Answer» D. Report availability of remote hosts | |
403. |
What is the difference between ring and bustopology? |
A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode |
D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
Answer» B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable | |
404. |
An alternative to JavaScript on windows platform is _______ |
A. | vbscript |
B. | asp.net |
C. | jsp |
D. | php |
Answer» B. asp.net | |
405. |
A stream socket provides _________ communications between a client and a server |
A. | One way |
B. | Two way |
Answer» C. | |
406. |
ONT is connected to splitter using _________ |
A. | high speed fibre cable |
B. | hfc |
C. | optical cable |
D. | twisted pair cable |
Answer» D. twisted pair cable | |
407. |
WiMAX uses the _________ |
A. | orthogonal frequency division multiplexing |
B. | time division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» B. time division multiplexing | |
408. |
IPv6 does not use ________ type of address. |
A. | broadcast |
B. | multicast |
C. | any cast |
D. | unicast |
Answer» B. multicast | |
409. |
In IPv6 addresses, addresses that start with eight 0s are called ________ |
A. | unicast addresses |
B. | multicast addresses |
C. | any cast addresses |
D. | reserved addresses |
Answer» E. | |
410. |
The decimal code of Interpret as Command (IAC) character is _______ |
A. | 252 |
B. | 253 |
C. | 254 |
D. | 255 |
Answer» E. | |
411. |
The combination of an IP address and a port number is known as. |
A. | network number |
B. | socket address |
C. | subnet mask number |
D. | MAC address |
Answer» C. subnet mask number | |
412. |
RTP is used to ________ |
A. | carry the media stream |
B. | monitor transmission statistics of streams |
C. | monitor quality of service of streams |
D. | secure the stream |
Answer» B. monitor transmission statistics of streams | |
413. |
Which of the following is reliable communication? |
A. | TCP |
B. | IP |
C. | UPD |
D. | All of them |
Answer» B. IP | |
414. |
Which methods are commonly used in Server Socket class? |
A. | public output stream get output stream () |
B. | public socket accept () |
C. | public synchronized void close () |
D. | public void connect () |
Answer» C. public synchronized void close () | |
415. |
An interconnected collection of piconet is called ___________ |
A. | scatternet |
B. | micronet |
C. | mininet |
D. | multinet |
Answer» B. micronet | |
416. |
RPC is a _________ |
A. | synchronous operation |
B. | asynchronous operation |
C. | time independent operation |
D. | channel specific operation |
Answer» B. asynchronous operation | |
417. |
Sending a file from your personal computer's primary memory or disk toanother computer is called |
A. | uploading |
B. | downloading |
C. | logging on |
D. | hangs on |
Answer» B. downloading | |
418. |
Which address is used on the internet for employing the TCP/IP protocols? |
A. | physical address and logical address |
B. | port address |
C. | specific address |
D. | all of the mentioned |
Answer» E. | |
419. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» D. e-mail | |
420. |
To join the internet, the computer has to be connected to a _________ |
A. | internet architecture board |
B. | internet society |
C. | internet service provider |
D. | different computer |
Answer» D. different computer | |
421. |
In IPv4 Addresses, classful addressing is replaced with ________ |
A. | classless addressing |
B. | classful addressing |
C. | classful advertising |
D. | classless advertising |
Answer» B. classful addressing | |
422. |
A packet filter firewall filters at __________ |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» D. application layer | |
423. |
Which of the following is a form of DoS attack? |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» E. | |
424. |
Virtual circuit identifier in frame relay is called ______ |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | circuit connection identifier |
Answer» B. frame relay identifier | |
425. |
What is the difference between ring and bus topology? |
A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a central node |
D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
Answer» B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable | |
426. |
A proxy firewall filters at _________ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» E. | |
427. |
Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browserWhich is the applicable level protocol user in each activity? |
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
428. |
_______ assigns a unique number to each IP network adapter called the MAC address. |
A. | Media Access Control |
B. | Metro Access Control |
C. | Metropolitan Access Control |
D. | Both B and C above |
Answer» B. Metro Access Control | |
429. |
A stream socket provides communications between a client and a server |
A. | One way |
B. | Two way |
C. | none |
D. | other |
Answer» C. none | |
430. |
When displaying a web page, the application layer uses the: |
A. | HTTP protocol |
B. | FTP protocol |
C. | SMTP protocol |
D. | none of the mentioned |
Answer» B. FTP protocol | |
431. |
Multiple processes on destinations at transport layer are identified by __________ |
A. | mac address |
B. | port number |
C. | host number |
D. | host address |
Answer» C. host number | |
432. |
Next-Hop Method is used to reduce contents of a _________ |
A. | revolving table |
B. | rotating table |
C. | routing table |
D. | re-allocate table |
Answer» D. re-allocate table | |
433. |
In frame relay networks, extended address is used _______ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» B. for error detection | |
434. |
During error reporting, ICMP always reports error messages to ________ |
A. | destination |
B. | source |
C. | next router |
D. | previous router |
Answer» C. next router | |
435. |
What is the max length of the Shielded twisted pair cable? |
A. | 100 ft |
B. | 200 ft |
C. | 100 m |
D. | 200 m |
Answer» D. 200 m | |
436. |
FTP server _____________ |
A. | maintains state information |
B. | is stateless |
C. | has single tcp connection for a file transfer |
D. | has udp connection for file transfer |
Answer» B. is stateless | |
437. |
Ping sweep is a part of _________ |
A. | traceroute |
B. | nmap |
C. | route |
D. | ipconfig |
Answer» C. route | |
438. |
Structure of Management Information (SMI), is the guideline of ________ |
A. | http |
B. | snmp |
C. | url |
D. | mib |
Answer» C. url | |
439. |
The first Network was called |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» E. | |
440. |
IP4 is more commonly used than IPv6? |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» B. False | |
441. |
Transport layer protocols deals with ____________ |
A. | application to application communication |
B. | process to process communication |
C. | node to node communication |
D. | man to man communication |
Answer» C. node to node communication | |
442. |
Which of the following is true for secure shell tunneling? |
A. | To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
B. | SSH tunnels provide a means to not bypassfirewalls |
C. | All SSH clients support dynamic port forwarding |
D. | Both A and B |
Answer» B. SSH tunnels provide a means to not bypassfirewalls | |
443. |
The application layer protocol used by a Telnet application is ________ |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» B. ftp | |
444. |
Network layer firewall has two sub-categories called ____________ |
A. | stateful firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network firewall and data firewall |
Answer» B. bit oriented firewall and byte oriented firewall | |
445. |
Which of the following is not related to ipconfig in Microsoft Windows? |
A. | display all current tcp/ip network configuration values |
B. | modify dhcp settings |
C. | modify dns settings |
D. | trace the routers in the path to destination |
Answer» E. | |
446. |
BER stands for ________ |
A. | basic encoding rules |
B. | basic encoding resolver |
C. | basic encoding rotator |
D. | basic encoding router |
Answer» B. basic encoding resolver | |
447. |
Which of the following is an example of user agents for e-mail? |
A. | microsoft outlook |
B. | |
C. | |
D. | tumblr |
Answer» B. facebook | |
448. |
Both ping and tracert are used to find If the computer is in the network. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» C. none | |
449. |
In an IPv6 header, the traffic class field is similar to which field in the IPv4 header? |
A. | fragmentation field |
B. | fast switching |
C. | tos field |
D. | option field |
Answer» D. option field | |
450. |
Beyond IP, UDP provides additional services such as _______ |
A. | routing and switching |
B. | sending and receiving of packets |
C. | multiplexing and demultiplexing |
D. | demultiplexing and error checking |
Answer» E. | |