

MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
151. |
A network management system can be divided into ___________ |
A. | three categories |
B. | five broad categories |
C. | seven broad categories |
D. | ten broad categories |
Answer» C. seven broad categories | |
152. |
MIB is a collection of groups of objects that can be managed by __________ |
A. | smtp |
B. | udp |
C. | snmp |
D. | tcp/ip |
Answer» D. tcp/ip | |
153. |
Which of the following networks supports pipelining effect? |
A. | circuit-switched networks |
B. | message-switched networks |
C. | packet-switched networks |
D. | stream-switched networks |
Answer» D. stream-switched networks | |
154. |
Performance management is closely related to _________ |
A. | proactive fault management |
B. | fault management |
C. | reactive fault management |
D. | preventive fault management |
Answer» C. reactive fault management | |
155. |
A stateful firewall maintains a ___________ which is a list of active connections. |
A. | routing table |
B. | bridging table |
C. | state table |
D. | connection table |
Answer» B. bridging table | |
156. |
A packet filter firewall filters at __________ |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» D. application layer | |
157. |
A proxy firewall filters at _________ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» E. | |
158. |
Which of the following is / are the types of firewall? |
A. | packet filtering firewall |
B. | dual homed gateway firewall |
C. | screen host firewall |
D. | dual host firewall |
Answer» B. dual homed gateway firewall | |
159. |
Network layer firewall has two sub-categories as _________ |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» B. bit oriented firewall and byte oriented firewall | |
160. |
Which of the following is false with respect to the datagram networks? |
A. | number of flows of packets are not limited |
B. | packets may not be in order at the destination |
C. | path is not reserved |
D. | delay is the same for all packets in a flow |
Answer» E. | |
161. |
Network layer firewall works as a __________ |
A. | frame filter |
B. | packet filter |
C. | content filter |
D. | virus filter |
Answer» C. content filter | |
162. |
Datagrams are routed to their destinations with the help of ________ |
A. | switch table |
B. | segments table |
C. | datagram table |
D. | routing table |
Answer» D. routing table | |
163. |
Packets in datagram switching are referred to as ________ |
A. | switches |
B. | segments |
C. | datagrams |
D. | data-packets |
Answer» D. data-packets | |
164. |
Which of the following is true with respect to the delay in datagram networks? |
A. | delay is greater than in a virtual circuit network |
B. | each packet may experience a wait at a switch |
C. | delay is not uniform for the packets of a message |
D. | all of the mentioned |
Answer» E. | |
165. |
Which OSPF show command describes a list of OSPF adjacencies? |
A. | show ip ospf interface |
B. | show ip ospf |
C. | show ip route |
D. | show ip ospf neighbor |
Answer» E. | |
166. |
Which two commands are required for basic OSPF configuration? |
A. | “[network mask] area [area-id]†and “router ospf [process-id]†|
B. | “[wildcard-mask] area [area-id]†and “[network mask] area [area-id]†|
C. | only “router ospf [process-id]†|
D. | “[wildcard-mask] area [area-id]†and “router ospf [process-id]†|
Answer» E. | |
167. |
Which field is NOT a field within an OSPF packet header? |
A. | packet length |
B. | router id |
C. | authentication type |
D. | maxage time |
Answer» E. | |
168. |
At which interval does OSPF refresh LSAs? |
A. | 10 seconds |
B. | 30 seconds |
C. | 30 minutes |
D. | 1 hour |
Answer» E. | |
169. |
The outcome of Dijkstra’s calculation is used to populate the __________ |
A. | topology table |
B. | routing table |
C. | neighbor table |
D. | adjacency table |
Answer» C. neighbor table | |
170. |
In OSPF header, which field is used to detect errors in the packet? |
A. | type |
B. | area id |
C. | authentication type |
D. | checksum |
Answer» E. | |
171. |
In OSPF, which protocol is used to discover neighbour routers automatically? |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | hello protocol |
Answer» E. | |
172. |
Which of the following is not a type of OSPF packet? |
A. | hello |
B. | link-state request |
C. | link-state response |
D. | link-state ack |
Answer» D. link-state ack | |
173. |
Open Shortest Path First (OSPF) is also called as _____________ |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | border gateway protocol |
Answer» B. error-correction protocol | |
174. |
The computation of the shortest path in OSPF is usually done by ____________ |
A. | bellman-ford algorithm |
B. | routing information protocol |
C. | dijkstra’s algorithm |
D. | distance vector routing |
Answer» D. distance vector routing | |
175. |
Network layer firewall has two sub-categories called ____________ |
A. | stateful firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network firewall and data firewall |
Answer» B. bit oriented firewall and byte oriented firewall | |
176. |
Network layer firewall works as a ________ |
A. | frame filter |
B. | packet filter |
C. | signal filter |
D. | content filter |
Answer» C. signal filter | |
177. |
LSP stands for __________ |
A. | link stable packet |
B. | link state packet |
C. | link state protocol |
D. | link state path |
Answer» C. link state protocol | |
178. |
RPF stands for __________ |
A. | reverse path forwarding |
B. | reverse path failure |
C. | reverse packet forwarding |
D. | reverse protocol failure |
Answer» B. reverse path failure | |
179. |
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________ |
A. | graph |
B. | tree |
C. | network |
D. | link |
Answer» B. tree | |
180. |
Next-Hop Method is used to reduce contents of a _________ |
A. | revolving table |
B. | rotating table |
C. | routing table |
D. | re-allocate table |
Answer» D. re-allocate table | |
181. |
Which of the following HTTP methods should be idempotent in nature? |
A. | options |
B. | delete |
C. | post |
D. | head |
Answer» C. post | |
182. |
What is the constraint on the data per cookie? |
A. | 2 kb |
B. | 1 kb |
C. | 4 kb |
D. | 3 kb |
Answer» D. 3 kb | |
183. |
Which of the following is a Boolean cookie attribute? |
A. | bool |
B. | secure |
C. | lookup |
D. | domain |
Answer» C. lookup | |
184. |
What does REST stand for? |
A. | represent state transfer |
B. | representational state transfer |
C. | representing state transfer |
D. | representation state transfer |
Answer» C. representing state transfer | |
185. |
How can you set a Cookie visibility scope to local Storage? |
A. | / |
B. | % |
C. | * |
D. | # |
Answer» B. % | |
186. |
Which of the following defines the Cookie visibility? |
A. | document path |
B. | localstorage |
C. | sessionstorage |
D. | all of the mentioned |
Answer» E. | |
187. |
Which attribute is used to extend the lifetime of a cookie? |
A. | higher-age |
B. | increase-age |
C. | max-age |
D. | lifetime |
Answer» D. lifetime | |
188. |
Which of the following can be used to configure the scope of the Cookie visibility? |
A. | path |
B. | domain |
C. | both path and domain |
D. | server |
Answer» E. | |
189. |
Which of the following explains Cookies nature? |
A. | non volatile |
B. | volatile |
C. | intransient |
D. | transient |
Answer» E. | |
190. |
The Cookie manipulation is done using which property? |
A. | cookie |
B. | cookies |
C. | manipulate |
D. | manipulate cookie |
Answer» B. cookies | |
191. |
Which classes are used for connection-less socket programming? |
A. | datagram socket |
B. | datagram packet |
C. | both datagram socket & datagram packet |
D. | server socket |
Answer» D. server socket | |
192. |
Cookies were originally designed for ____________ |
A. | client side programming |
B. | server side programming |
C. | both client side programming and server side programming |
D. | socket programming |
Answer» C. both client side programming and server side programming | |
193. |
In Inet Address class, which method returns the host name of the IP Address? |
A. | public string get hostname() |
B. | public string gethostaddress() |
C. | public static inetaddress get localhost() |
D. | public getbyname() |
Answer» B. public string gethostaddress() | |
194. |
TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________ |
A. | socket |
B. | ip address |
C. | protocol |
D. | mac address |
Answer» D. mac address | |
195. |
The client in socket programming must know which information? |
A. | ip address of server |
B. | port number |
C. | both ip address of server & port number |
D. | only its own ip address |
Answer» D. only its own ip address | |
196. |
In File Transfer Protocol, data transfer cannot be done in __________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» E. | |
197. |
The File Transfer Protocol is built on __________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» D. connection oriented architecture | |
198. |
In FTP protocol, a client contacts a server using ______ as the transport protocol. |
A. | transmission control protocol |
B. | user datagram protocol |
C. | datagram congestion control protocol |
D. | stream control transmission protocol |
Answer» B. user datagram protocol | |
199. |
FTP server listens for connection on which port number? |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» C. 22 | |
200. |
In the network HTTP resources are located by __________ |
A. | uniform resource identifier |
B. | unique resource locator |
C. | unique resource identifier |
D. | union resource locator |
Answer» B. unique resource locator | |