Explore topic-wise MCQs in Electrical Engineering.

This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.

301.

Which of the following is false with respect to UDP?

A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Answer» B. unreliable
302.

Return value of the UDP port “Chargen” is _______

A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer» B. string of integers
303.

SYNC flooding attack belongs to a type of security attack known as ___________

A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer» E.
304.

What allows TCP to detect lost segments and in turn recover from that loss?

A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Answer» C. checksum
305.

Size of TCP segment header ranges between ___________

A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 20 and 60 bits
Answer» D. 20 and 60 bits
306.

The value of acknowledgement field in a segment defines _______

A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Answer» D. sequence of zeros and ones
307.

TCP groups a number of bytes together into a packet called _______

A. packet
B. buffer
C. segment
D. stack
Answer» D. stack
308.

In TCP, sending and receiving data is done as _______

A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Answer» B. sequence of characters
309.

Which of the following is false with respect to TCP?

A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Answer» E.
310.

Communication offered by TCP is ________

A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Answer» B. half-duplex
311.

The decimal code of Interpret as Command (IAC) character is _______

A. 252
B. 253
C. 254
D. 255
Answer» E.
312.

AbsoluteTelnet is a telnet client for _______ Operating system.

A. windows
B. linux
C. mac
D. ubuntu
Answer» B. linux
313.

All telnet operations are sent as ________

A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Answer» C. 16 bits
314.

Which one of the following is not true?

A. telnet defines a network virtual terminal (nvt) standard
B. client programs interact with nvt
C. server translates nvt operations
D. client can transfer files using to remote server using nvt
Answer» E.
315.

Telnet protocol is used to establish a connection to __________

A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Answer» D. tcp port number 25
316.

If we want that a character be interpreted by the client instead of server _________

A. interpret as command (iac) escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. cli character has to be used
Answer» B. control functions has to be disabled
317.

Which one of the following is not correct?

A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. telnet can be used for remote login
Answer» D. telnet can be used for remote login
318.

Which operating mode of telnet is full duplex?

A. default mode
B. server mode
C. line mode
D. character mode
Answer» D. character mode
319.

_______ allows you to connect and login to a remote computer

A. telnet
B. ftp
C. http
D. smtp
Answer» B. ftp
320.

Telnet is used for _______

A. television on net
B. network of telephones
C. remote login
D. teleshopping site
Answer» D. teleshopping site
321.

The application layer protocol used by a Telnet application is ________

A. telnet
B. ftp
C. http
D. smtp
Answer» B. ftp
322.

Structure of Management Information (SMI), is the guideline of ________

A. http
B. snmp
C. url
D. mib
Answer» C. url
323.

SNMP is the framework for managing devices in an internet using the ______

A. tcp/ip protocol
B. udp
C. smtp
D. none
Answer» B. udp
324.

BER stands for ________

A. basic encoding rules
B. basic encoding resolver
C. basic encoding rotator
D. basic encoding router
Answer» B. basic encoding resolver
325.

The main difference between SNMPv3 and SNMPv2 is _______

A. management
B. integration
C. classification
D. enhanced security
Answer» E.
326.

Configuration management can be divided into which two subsystems?

A. reconfiguration and documentation
B. management and configuration
C. documentation and dialing up
D. configuration and dialing up
Answer» B. management and configuration
327.

To use a Simple Network Management System, we need _______

A. servers
B. ip
C. protocols
D. rules
Answer» E.
328.

SMI-S Standard uses which of the following?

A. java rmi
B. cim-xml/http
C. corba
D. .net
Answer» C. corba
329.

Full duplex mode increases the capacity of each domain by ________

A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer» B. 20 to 30 mbps
330.

Effective Storage management does not include __________

A. security
B. backups
C. reporting
D. connection
Answer» E.
331.

How do Storage administrators ensure secure access to storage devices?

A. by using zoning
B. by putting a physical lock on the storage device
C. by keeping devices shutdown when not in use
D. by keeping devices when used
Answer» B. by putting a physical lock on the storage device
332.

Which protocols are used for Storage management?

A. snmp
B. ldap
C. pop3
D. mib
Answer» B. ldap
333.

Which of the following is not a storage device?

A. switch
B. raid arrays
C. tape drives
D. hub
Answer» E.
334.

Storage management comprises of _______________

A. san management
B. data protection
C. disk operation
D. all of the mentioned
Answer» E.
335.

DHCP client and servers on the same subnet communicate via _________

A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer» B. udp unicast
336.

IP assigned for a client by DHCP server is

A. for a limited period
B. for an unlimited period
C. not time dependent
D. none of the mentioned
Answer» B. for an unlimited period
337.

The DHCP server _________

A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Answer» E.
338.

DHCP is used for ________

A. ipv6
B. ipv4
C. both ipv6 and ipv4
D. none of the mentioned
Answer» D. none of the mentioned
339.

DHCP (dynamic host configuration protocol) provides __________ to the client.

A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» B. mac address
340.

Which one of the following authentication method is used by SSH?

A. public-key
B. host based
C. password
D. all of the mentioned
Answer» E.
341.

SCP protocol is evolved from __________ over SSH.

A. rcp protocol
B. dhcp protocol
C. mgcp protocol
D. gcp protocol
Answer» B. dhcp protocol
342.

Which one of the following feature was present in SSH protocol, version 1?

A. password changing
B. periodic replacement of session keys
C. support for public-key certificates
D. none of the mentioned
Answer» E.
343.

Which one of the following is a file transfer protocol using SSH?

A. scp
B. sftp
C. rsync
D. all of the mentioned
Answer» E.
344.

SSH-2 does not contain ______________

A. transport layer
B. user authentication layer
C. physical layer
D. connection layer
Answer» D. connection layer
345.

SSH can be used in only _____________

A. unix-like operating systems
B. windows
C. both unix-like and windows systems
D. none of the mentioned
Answer» D. none of the mentioned
346.

Secure shell (SSH) network protocol is used for __________

A. secure data communication
B. remote command-line login
C. remote command execution
D. all of the mentioned
Answer» E.
347.

SSH uses ___________ to authenticate the remote computer.

A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. both public-key & private-key
Answer» B. private-key cryptography
348.

The domain name system is maintained by _______

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» B. a single server
349.

Wildcard domain names start with label _______

A. @
B. *
C. &
D. #
Answer» C. &
350.

If a server has no clue about where to find the address for a hostname then _______

A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» B. server asks to its adjcent server