Explore topic-wise MCQs in Electrical Engineering.

This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.

151.

A network management system can be divided into ___________

A. three categories
B. five broad categories
C. seven broad categories
D. ten broad categories
Answer» C. seven broad categories
152.

MIB is a collection of groups of objects that can be managed by __________

A. smtp
B. udp
C. snmp
D. tcp/ip
Answer» D. tcp/ip
153.

Which of the following networks supports pipelining effect?

A. circuit-switched networks
B. message-switched networks
C. packet-switched networks
D. stream-switched networks
Answer» D. stream-switched networks
154.

Performance management is closely related to _________

A. proactive fault management
B. fault management
C. reactive fault management
D. preventive fault management
Answer» C. reactive fault management
155.

A stateful firewall maintains a ___________ which is a list of active connections.

A. routing table
B. bridging table
C. state table
D. connection table
Answer» B. bridging table
156.

A packet filter firewall filters at __________

A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Answer» D. application layer
157.

A proxy firewall filters at _________

A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» E.
158.

Which of the following is / are the types of firewall?

A. packet filtering firewall
B. dual homed gateway firewall
C. screen host firewall
D. dual host firewall
Answer» B. dual homed gateway firewall
159.

Network layer firewall has two sub-categories as _________

A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» B. bit oriented firewall and byte oriented firewall
160.

Which of the following is false with respect to the datagram networks?

A. number of flows of packets are not limited
B. packets may not be in order at the destination
C. path is not reserved
D. delay is the same for all packets in a flow
Answer» E.
161.

Network layer firewall works as a __________

A. frame filter
B. packet filter
C. content filter
D. virus filter
Answer» C. content filter
162.

Datagrams are routed to their destinations with the help of ________

A. switch table
B. segments table
C. datagram table
D. routing table
Answer» D. routing table
163.

Packets in datagram switching are referred to as ________

A. switches
B. segments
C. datagrams
D. data-packets
Answer» D. data-packets
164.

Which of the following is true with respect to the delay in datagram networks?

A. delay is greater than in a virtual circuit network
B. each packet may experience a wait at a switch
C. delay is not uniform for the packets of a message
D. all of the mentioned
Answer» E.
165.

Which OSPF show command describes a list of OSPF adjacencies?

A. show ip ospf interface
B. show ip ospf
C. show ip route
D. show ip ospf neighbor
Answer» E.
166.

Which two commands are required for basic OSPF configuration?

A. “[network mask] area [area-id]” and “router ospf [process-id]”
B. “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]”
C. only “router ospf [process-id]”
D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
Answer» E.
167.

Which field is NOT a field within an OSPF packet header?

A. packet length
B. router id
C. authentication type
D. maxage time
Answer» E.
168.

At which interval does OSPF refresh LSAs?

A. 10 seconds
B. 30 seconds
C. 30 minutes
D. 1 hour
Answer» E.
169.

The outcome of Dijkstra’s calculation is used to populate the __________

A. topology table
B. routing table
C. neighbor table
D. adjacency table
Answer» C. neighbor table
170.

In OSPF header, which field is used to detect errors in the packet?

A. type
B. area id
C. authentication type
D. checksum
Answer» E.
171.

In OSPF, which protocol is used to discover neighbour routers automatically?

A. link state protocol
B. error-correction protocol
C. routing information protocol
D. hello protocol
Answer» E.
172.

Which of the following is not a type of OSPF packet?

A. hello
B. link-state request
C. link-state response
D. link-state ack
Answer» D. link-state ack
173.

Open Shortest Path First (OSPF) is also called as _____________

A. link state protocol
B. error-correction protocol
C. routing information protocol
D. border gateway protocol
Answer» B. error-correction protocol
174.

The computation of the shortest path in OSPF is usually done by ____________

A. bellman-ford algorithm
B. routing information protocol
C. dijkstra’s algorithm
D. distance vector routing
Answer» D. distance vector routing
175.

Network layer firewall has two sub-categories called ____________

A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network firewall and data firewall
Answer» B. bit oriented firewall and byte oriented firewall
176.

Network layer firewall works as a ________

A. frame filter
B. packet filter
C. signal filter
D. content filter
Answer» C. signal filter
177.

LSP stands for __________

A. link stable packet
B. link state packet
C. link state protocol
D. link state path
Answer» C. link state protocol
178.

RPF stands for __________

A. reverse path forwarding
B. reverse path failure
C. reverse packet forwarding
D. reverse protocol failure
Answer» B. reverse path failure
179.

In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________

A. graph
B. tree
C. network
D. link
Answer» B. tree
180.

Next-Hop Method is used to reduce contents of a _________

A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» D. re-allocate table
181.

Which of the following HTTP methods should be idempotent in nature?

A. options
B. delete
C. post
D. head
Answer» C. post
182.

What is the constraint on the data per cookie?

A. 2 kb
B. 1 kb
C. 4 kb
D. 3 kb
Answer» D. 3 kb
183.

Which of the following is a Boolean cookie attribute?

A. bool
B. secure
C. lookup
D. domain
Answer» C. lookup
184.

What does REST stand for?

A. represent state transfer
B. representational state transfer
C. representing state transfer
D. representation state transfer
Answer» C. representing state transfer
185.

How can you set a Cookie visibility scope to local Storage?

A. /
B. %
C. *
D. #
Answer» B. %
186.

Which of the following defines the Cookie visibility?

A. document path
B. localstorage
C. sessionstorage
D. all of the mentioned
Answer» E.
187.

Which attribute is used to extend the lifetime of a cookie?

A. higher-age
B. increase-age
C. max-age
D. lifetime
Answer» D. lifetime
188.

Which of the following can be used to configure the scope of the Cookie visibility?

A. path
B. domain
C. both path and domain
D. server
Answer» E.
189.

Which of the following explains Cookies nature?

A. non volatile
B. volatile
C. intransient
D. transient
Answer» E.
190.

The Cookie manipulation is done using which property?

A. cookie
B. cookies
C. manipulate
D. manipulate cookie
Answer» B. cookies
191.

Which classes are used for connection-less socket programming?

A. datagram socket
B. datagram packet
C. both datagram socket & datagram packet
D. server socket
Answer» D. server socket
192.

Cookies were originally designed for ____________

A. client side programming
B. server side programming
C. both client side programming and server side programming
D. socket programming
Answer» C. both client side programming and server side programming
193.

In Inet Address class, which method returns the host name of the IP Address?

A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Answer» B. public string gethostaddress()
194.

TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________

A. socket
B. ip address
C. protocol
D. mac address
Answer» D. mac address
195.

The client in socket programming must know which information?

A. ip address of server
B. port number
C. both ip address of server & port number
D. only its own ip address
Answer» D. only its own ip address
196.

In File Transfer Protocol, data transfer cannot be done in __________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» E.
197.

The File Transfer Protocol is built on __________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» D. connection oriented architecture
198.

In FTP protocol, a client contacts a server using ______ as the transport protocol.

A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» B. user datagram protocol
199.

FTP server listens for connection on which port number?

A. 20
B. 21
C. 22
D. 23
Answer» C. 22
200.

In the network HTTP resources are located by __________

A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» B. unique resource locator