MCQOPTIONS
Saved Bookmarks
This section includes 108 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following statements is/are correct about Non Persistent HTTP? |
| A. | Non Persistent HTTP connection is also called as HTTP keep-alive. |
| B. | All the requests and responses between client and server can be sent over the same connection. |
| C. | Non persistent uses HTTP version 2.0 |
| D. | All of the above |
| Answer» C. Non persistent uses HTTP version 2.0 | |
| 2. |
Which of the following statements is/are correct about distance vector? |
| A. | Router don’t knows the identity of other router. |
| B. | Cost of each couple is not equal to destination. |
| C. | Each router maintains a distance vector. |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 3. |
Which of the following statements is/are correct about the UDP header? |
| A. | application programs use to send data to other application programs. |
| B. | distinguish port numbers between multiple programs on a single device. |
| C. | UDP have limited size header of 8 bytes. |
| D. | Both a and b |
| E. | Both a and c |
| Answer» E. Both a and c | |
| 4. |
Which of the following statements is/are not correct about Leaky Bucket Algorithm? |
| A. | It is a bucket with a hole at bottom. |
| B. | Packets are never lost. |
| C. | A variant on the leaky bucket is the token bucket. |
| D. | Leaky bucket doesn't have the finite queue length. |
| Answer» E. | |
| 5. |
Which of the following statements is/are not true about Persistent HTTP? |
| A. | TCP connection is closed after the interval timeout by the http server. |
| B. | The new connection is established and maintained for each request object. |
| C. | Persistent will use HTTP version 1.1. |
| D. | None of the above |
| Answer» B. The new connection is established and maintained for each request object. | |
| 6. |
Which of the following statements is/are not true for connection-oriented network? |
| A. | It doesn't give guarantee of service. |
| B. | It takes less time for sending the packets. |
| C. | Utilization of resources is good. |
| D. | Both a and c |
| E. | All of the above |
| Answer» F. | |
| 7. |
Which of the following statements is/are true about OSPF? |
| A. | error detecting process. |
| B. | interior routing protocol. |
| C. | widely used in TCP/IP. |
| D. | create traffic load on multiple links. |
| Answer» C. widely used in TCP/IP. | |
| 8. |
Which of the following statements is/are true about MPLS packets? |
| A. | It creates a virtual circuit for transmission of data packets. |
| B. | The label is used as an index for determining which outgoing line and new label is to be used. This new label contains the address of next MPLS router |
| C. | MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow. |
| D. | Both b and c |
| E. | Both a and c |
| Answer» C. MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow. | |
| 9. |
Which of the following statements is/are true about path vector routing? |
| A. | Path vector routing is similar to the link state router. |
| B. | Exterior Gateway Protocol (EGP) is used in Path Vector. |
| C. | Maintains the path information and gets updated dynamically. |
| D. | Not flexible in selecting the path while hiding the information. |
| Answer» D. Not flexible in selecting the path while hiding the information. | |
| 10. |
Which of the following statements is/are true about Traffic shaping? |
| A. | It is an open loop control. |
| B. | It will not regulate the average rate of data transmission. |
| C. | It is also known as traffic policing. |
| D. | All of the above. |
| Answer» B. It will not regulate the average rate of data transmission. | |
| 11. |
Which of the following statements is/are true for connectionless network? |
| A. | Not required so much information for storing |
| B. | No need to established a connection. |
| C. | Randomly packets distributed. |
| D. | All of the above. |
| E. | None of the above. |
| Answer» E. None of the above. | |
| 12. |
Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack? |
| A. | Flow control will be handled |
| B. | Data transfer will be reliable. |
| C. | Byte stream won't be transferred to another machine. |
| D. | None of the above |
| Answer» D. None of the above | |
| 13. |
Which of the following types is/are the network connecting devices? |
| A. | Repeaters and Hubs |
| B. | Bridges and Routers |
| C. | Gateway and switches |
| D. | All of the above |
| Answer» E. | |
| 14. |
Which protocol does FTP use for transferring the files in the network? |
| A. | UDP |
| B. | TCP |
| C. | ICMP |
| D. | ARP |
| Answer» C. ICMP | |
| 15. |
Which protocol does TFTP use while working on the network? |
| A. | ARP |
| B. | FTP |
| C. | UDP |
| D. | TCP |
| Answer» D. TCP | |
| 16. |
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? |
| A. | LCP |
| B. | NCP |
| C. | Both a and b |
| D. | TCP |
| Answer» D. TCP | |
| 17. |
Which protocol is used after authentication has been completed? |
| A. | User Datagram Protocol |
| B. | PPP Protocol |
| C. | Transmission Control Protocol |
| D. | Network Control Protocol |
| Answer» E. | |
| 18. |
Which queue operation is used for holding the packets in Leaky Bucket implementation? |
| A. | LIFO |
| B. | FILO |
| C. | FIFO |
| D. | All of the above |
| Answer» D. All of the above | |
| 19. |
Which type of addressing scheme is used in Message switching? |
| A. | Hierarchical addresses |
| B. | Geographical addresses |
| C. | Manual addresses |
| D. | All of the above |
| Answer» C. Manual addresses | |
| 20. |
Why ATM was developed? |
| A. | To handle both traditional high-throughput data traffic and real-time,low-latency content. |
| B. | Designed to unify telecommunication and computer networks. |
| C. | To meet the needs of the Broadband Integrated Services Digital Network. |
| D. | All of the above. |
| Answer» E. | |
| 21. |
Why Ipv6 replaces ARP by using the ND protocol? |
| A. | The ARP address statically bound. |
| B. | The security issues are apply. |
| C. | Both a and b |
| D. | The interface identifier portion of an Ipv6 address is directly derived from MAC address. |
| Answer» E. | |
| 22. |
Why was the IETF developed? |
| A. | to support quality of service |
| B. | to create standardized protocols |
| C. | for IP security |
| D. | All of the above |
| Answer» C. for IP security | |
| 23. |
Why was the Ipv6 protocol introduced? |
| A. | IP security |
| B. | Better Quality of Service support |
| C. | Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4) |
| D. | All of the above |
| Answer» E. | |
| 24. |
Which of the following statement is true about Connectionless service? |
| A. | The connection is established in connectionless service. |
| B. | Connectionless service is suitable for bursty transmission. |
| C. | Connectionless services can give services guarantees. |
| D. | Connectionless services can avoid bottleneck problem. |
| Answer» C. Connectionless services can give services guarantees. | |
| 25. |
Which of the following protocol is used to allow the encapsulation of data coming from the network layer protocol? |
| A. | TCP |
| B. | NCP |
| C. | LCP |
| D. | HDLC |
| Answer» C. LCP | |
| 26. |
Which of the following policies is/are related to Network layer? |
| A. | Window policy |
| B. | Traffic shaping |
| C. | Traffic policing |
| D. | Packet services |
| Answer» E. | |
| 27. |
Which of the following methods is/are used in Packet switching? |
| A. | Datagram Packet Switching |
| B. | Virtual-circuit Packet Switching |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 28. |
Which of the following methods is/are used in Message switching? |
| A. | Store and Forward |
| B. | Switch to Switch |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 29. |
Which of the following is/are the Routing algorithms? |
| A. | Nonadaptive algorithm and Adaptive algorithm |
| B. | Static routing and Dynamic routing |
| C. | Distance vector routing and link state routing |
| D. | Both a and b |
| E. | All of the above |
| Answer» E. All of the above | |
| 30. |
Which of the following is/are the disadvantages of fragmentation? |
| A. | All the packets should exit via the same gateway |
| B. | Overhead doesn't required to repeatedly fragment. |
| C. | Dos attack will encounter. |
| D. | All of the above |
| Answer» B. Overhead doesn't required to repeatedly fragment. | |
| 31. |
Which of the following is/are the advantages of hierarchical routing? |
| A. | Portability |
| B. | Scalability |
| C. | Reliability |
| D. | Flexibility |
| Answer» C. Reliability | |
| 32. |
Which of the following is/are the advantages of connection-oriented networking |
| A. | Quality of service |
| B. | No Priority service |
| C. | Bandwidth utilization |
| D. | All of the above |
| Answer» E. | |
| 33. |
Which of the following is/are functions of header subfields? I. Router change flag II. Virtual path identifier III. Header error control IV. Cell loss priority |
| A. | III, IV |
| B. | II, III, IV |
| C. | I, II |
| D. | I, III, II |
| Answer» C. I, II | |
| 34. |
Which of the following is true about “Threshold”? |
| A. | Threshold is a value. |
| B. | Threshold has value levels, such as minimum level, maximum level, equal level. |
| C. | If the data value doesn't suit the threshold value, then it indicates that this data value might lead to poor performance of the network. |
| D. | All of the above |
| Answer» E. | |
| 35. |
Which of the following is true about Network Control Protocol (NCP)? |
| A. | It is strictly used for data authentication. |
| B. | It decides the encapsulation of network layer data into the data link frame |
| C. | It is useful to set-up configure, maintain and terminate a link connection. |
| D. | All of the above. |
| Answer» C. It is useful to set-up configure, maintain and terminate a link connection. | |
| 36. |
Which of the following is true about Manchester encoding? |
| A. | Each bit period is divided into two equal intervals. |
| B. | It requires more bandwidth than 8B/10B encoding. |
| C. | It is a form of digital encoding. |
| D. | All of the above |
| Answer» E. | |
| 37. |
Which of the following is true about Domain Name System (DNS)? |
| A. | DNS is the client server application. |
| B. | It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address. |
| C. | It identifies sender and receiver so they should be known to each other. |
| D. | All of the above. |
| Answer» E. | |
| 38. |
Which of the following is the communication protocol developed by ISO? |
| A. | MPLS |
| B. | PPP |
| C. | HDLC |
| D. | CRC |
| Answer» D. CRC | |
| 39. |
Which of the following fundamental model helps to know the key problems for the designers of distributed system? |
| A. | OSI model |
| B. | Hybrid model |
| C. | TCP/IP model |
| D. | All of the above |
| Answer» E. | |
| 40. |
Which of the following congestion control will not give converge in TCP congestion avoidance? |
| A. | MIMD |
| B. | AIAD |
| C. | Both a and b |
| D. | AIMD |
| Answer» D. AIMD | |
| 41. |
Which of the following aspects is/are mostly covered in the FEC? |
| A. | How many packets are there. |
| B. | What type of service class is there |
| C. | Which packets are going to be used. |
| D. | Where the packets are going. |
| Answer» E. | |
| 42. |
Which of the following are the HTTP methods (request types)? I. GET II. POST III. PATCH IV. BODY V. CREATE VI. OPTION |
| A. | I, II, III, IV, V |
| B. | I, II |
| C. | IV, V, VI |
| D. | I, II, III, VI |
| Answer» E. | |
| 43. |
Which information form/type is used for transferring the data in Packet switching? |
| A. | Morse |
| B. | ASCII |
| C. | Binary |
| D. | Baudot |
| Answer» D. Baudot | |
| 44. |
Which connection does the OSI model support in networking? |
| A. | Connection-oriented |
| B. | Connectionless |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 45. |
Which cell does Asynchronous Transfer Mode (ATM) use? |
| A. | Bridges |
| B. | Switches |
| C. | Routers |
| D. | Hubs |
| Answer» C. Routers | |
| 46. |
Which architectures is/are required to QoS? |
| A. | Integrated Services |
| B. | Differentiated Services |
| C. | Reserved Services |
| D. | Both a and b |
| E. | Both b and c |
| Answer» E. Both b and c | |
| 47. |
Which algorithm is best for use in TCP congestion avoidance? |
| A. | MIMD |
| B. | AIAD |
| C. | Both a and b |
| D. | AlMD |
| Answer» E. | |
| 48. |
When too many packets are present in a part of a subnet the performance degrades, this situation is called as Congestion. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 49. |
When hierarchical routing is used on the internet? |
| A. | Total number of routers are divided into different regions. |
| B. | Routers cannot handle network traffic efficiently. |
| C. | Router increases the network size. |
| D. | None of the above |
| Answer» C. Router increases the network size. | |
| 50. |
What kind of task does MIME do in the SMTP protocol? |
| A. | It only transfers the email and not receive them. |
| B. | It transfers a message from the SMTP sender to the SMTP receiver over a TCP/IP. |
| C. | It works under the Mail Transfer Agent (MAT). |
| D. | It encodes the binary files and send. |
| Answer» E. | |