

MCQOPTIONS
Saved Bookmarks
This section includes 108 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following statements is/are correct about Non Persistent HTTP? |
A. | Non Persistent HTTP connection is also called as HTTP keep-alive. |
B. | All the requests and responses between client and server can be sent over the same connection. |
C. | Non persistent uses HTTP version 2.0 |
D. | All of the above |
Answer» C. Non persistent uses HTTP version 2.0 | |
2. |
Which of the following statements is/are correct about distance vector? |
A. | Router don’t knows the identity of other router. |
B. | Cost of each couple is not equal to destination. |
C. | Each router maintains a distance vector. |
D. | All of the above. |
Answer» D. All of the above. | |
3. |
Which of the following statements is/are correct about the UDP header? |
A. | application programs use to send data to other application programs. |
B. | distinguish port numbers between multiple programs on a single device. |
C. | UDP have limited size header of 8 bytes. |
D. | Both a and b |
E. | Both a and c |
Answer» E. Both a and c | |
4. |
Which of the following statements is/are not correct about Leaky Bucket Algorithm? |
A. | It is a bucket with a hole at bottom. |
B. | Packets are never lost. |
C. | A variant on the leaky bucket is the token bucket. |
D. | Leaky bucket doesn't have the finite queue length. |
Answer» E. | |
5. |
Which of the following statements is/are not true about Persistent HTTP? |
A. | TCP connection is closed after the interval timeout by the http server. |
B. | The new connection is established and maintained for each request object. |
C. | Persistent will use HTTP version 1.1. |
D. | None of the above |
Answer» B. The new connection is established and maintained for each request object. | |
6. |
Which of the following statements is/are not true for connection-oriented network? |
A. | It doesn't give guarantee of service. |
B. | It takes less time for sending the packets. |
C. | Utilization of resources is good. |
D. | Both a and c |
E. | All of the above |
Answer» F. | |
7. |
Which of the following statements is/are true about OSPF? |
A. | error detecting process. |
B. | interior routing protocol. |
C. | widely used in TCP/IP. |
D. | create traffic load on multiple links. |
Answer» C. widely used in TCP/IP. | |
8. |
Which of the following statements is/are true about MPLS packets? |
A. | It creates a virtual circuit for transmission of data packets. |
B. | The label is used as an index for determining which outgoing line and new label is to be used. This new label contains the address of next MPLS router |
C. | MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow. |
D. | Both b and c |
E. | Both a and c |
Answer» C. MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow. | |
9. |
Which of the following statements is/are true about path vector routing? |
A. | Path vector routing is similar to the link state router. |
B. | Exterior Gateway Protocol (EGP) is used in Path Vector. |
C. | Maintains the path information and gets updated dynamically. |
D. | Not flexible in selecting the path while hiding the information. |
Answer» D. Not flexible in selecting the path while hiding the information. | |
10. |
Which of the following statements is/are true about Traffic shaping? |
A. | It is an open loop control. |
B. | It will not regulate the average rate of data transmission. |
C. | It is also known as traffic policing. |
D. | All of the above. |
Answer» B. It will not regulate the average rate of data transmission. | |
11. |
Which of the following statements is/are true for connectionless network? |
A. | Not required so much information for storing |
B. | No need to established a connection. |
C. | Randomly packets distributed. |
D. | All of the above. |
E. | None of the above. |
Answer» E. None of the above. | |
12. |
Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack? |
A. | Flow control will be handled |
B. | Data transfer will be reliable. |
C. | Byte stream won't be transferred to another machine. |
D. | None of the above |
Answer» D. None of the above | |
13. |
Which of the following types is/are the network connecting devices? |
A. | Repeaters and Hubs |
B. | Bridges and Routers |
C. | Gateway and switches |
D. | All of the above |
Answer» E. | |
14. |
Which protocol does FTP use for transferring the files in the network? |
A. | UDP |
B. | TCP |
C. | ICMP |
D. | ARP |
Answer» C. ICMP | |
15. |
Which protocol does TFTP use while working on the network? |
A. | ARP |
B. | FTP |
C. | UDP |
D. | TCP |
Answer» D. TCP | |
16. |
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? |
A. | LCP |
B. | NCP |
C. | Both a and b |
D. | TCP |
Answer» D. TCP | |
17. |
Which protocol is used after authentication has been completed? |
A. | User Datagram Protocol |
B. | PPP Protocol |
C. | Transmission Control Protocol |
D. | Network Control Protocol |
Answer» E. | |
18. |
Which queue operation is used for holding the packets in Leaky Bucket implementation? |
A. | LIFO |
B. | FILO |
C. | FIFO |
D. | All of the above |
Answer» D. All of the above | |
19. |
Which type of addressing scheme is used in Message switching? |
A. | Hierarchical addresses |
B. | Geographical addresses |
C. | Manual addresses |
D. | All of the above |
Answer» C. Manual addresses | |
20. |
Why ATM was developed? |
A. | To handle both traditional high-throughput data traffic and real-time,low-latency content. |
B. | Designed to unify telecommunication and computer networks. |
C. | To meet the needs of the Broadband Integrated Services Digital Network. |
D. | All of the above. |
Answer» E. | |
21. |
Why Ipv6 replaces ARP by using the ND protocol? |
A. | The ARP address statically bound. |
B. | The security issues are apply. |
C. | Both a and b |
D. | The interface identifier portion of an Ipv6 address is directly derived from MAC address. |
Answer» E. | |
22. |
Why was the IETF developed? |
A. | to support quality of service |
B. | to create standardized protocols |
C. | for IP security |
D. | All of the above |
Answer» C. for IP security | |
23. |
Why was the Ipv6 protocol introduced? |
A. | IP security |
B. | Better Quality of Service support |
C. | Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4) |
D. | All of the above |
Answer» E. | |
24. |
Which of the following statement is true about Connectionless service? |
A. | The connection is established in connectionless service. |
B. | Connectionless service is suitable for bursty transmission. |
C. | Connectionless services can give services guarantees. |
D. | Connectionless services can avoid bottleneck problem. |
Answer» C. Connectionless services can give services guarantees. | |
25. |
Which of the following protocol is used to allow the encapsulation of data coming from the network layer protocol? |
A. | TCP |
B. | NCP |
C. | LCP |
D. | HDLC |
Answer» C. LCP | |
26. |
Which of the following policies is/are related to Network layer? |
A. | Window policy |
B. | Traffic shaping |
C. | Traffic policing |
D. | Packet services |
Answer» E. | |
27. |
Which of the following methods is/are used in Packet switching? |
A. | Datagram Packet Switching |
B. | Virtual-circuit Packet Switching |
C. | Both a and b |
D. | None of the above |
Answer» D. None of the above | |
28. |
Which of the following methods is/are used in Message switching? |
A. | Store and Forward |
B. | Switch to Switch |
C. | Both a and b |
D. | None of the above |
Answer» D. None of the above | |
29. |
Which of the following is/are the Routing algorithms? |
A. | Nonadaptive algorithm and Adaptive algorithm |
B. | Static routing and Dynamic routing |
C. | Distance vector routing and link state routing |
D. | Both a and b |
E. | All of the above |
Answer» E. All of the above | |
30. |
Which of the following is/are the disadvantages of fragmentation? |
A. | All the packets should exit via the same gateway |
B. | Overhead doesn't required to repeatedly fragment. |
C. | Dos attack will encounter. |
D. | All of the above |
Answer» B. Overhead doesn't required to repeatedly fragment. | |
31. |
Which of the following is/are the advantages of hierarchical routing? |
A. | Portability |
B. | Scalability |
C. | Reliability |
D. | Flexibility |
Answer» C. Reliability | |
32. |
Which of the following is/are the advantages of connection-oriented networking |
A. | Quality of service |
B. | No Priority service |
C. | Bandwidth utilization |
D. | All of the above |
Answer» E. | |
33. |
Which of the following is/are functions of header subfields? I. Router change flag II. Virtual path identifier III. Header error control IV. Cell loss priority |
A. | III, IV |
B. | II, III, IV |
C. | I, II |
D. | I, III, II |
Answer» C. I, II | |
34. |
Which of the following is true about “Threshold”? |
A. | Threshold is a value. |
B. | Threshold has value levels, such as minimum level, maximum level, equal level. |
C. | If the data value doesn't suit the threshold value, then it indicates that this data value might lead to poor performance of the network. |
D. | All of the above |
Answer» E. | |
35. |
Which of the following is true about Network Control Protocol (NCP)? |
A. | It is strictly used for data authentication. |
B. | It decides the encapsulation of network layer data into the data link frame |
C. | It is useful to set-up configure, maintain and terminate a link connection. |
D. | All of the above. |
Answer» C. It is useful to set-up configure, maintain and terminate a link connection. | |
36. |
Which of the following is true about Manchester encoding? |
A. | Each bit period is divided into two equal intervals. |
B. | It requires more bandwidth than 8B/10B encoding. |
C. | It is a form of digital encoding. |
D. | All of the above |
Answer» E. | |
37. |
Which of the following is true about Domain Name System (DNS)? |
A. | DNS is the client server application. |
B. | It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address. |
C. | It identifies sender and receiver so they should be known to each other. |
D. | All of the above. |
Answer» E. | |
38. |
Which of the following is the communication protocol developed by ISO? |
A. | MPLS |
B. | PPP |
C. | HDLC |
D. | CRC |
Answer» D. CRC | |
39. |
Which of the following fundamental model helps to know the key problems for the designers of distributed system? |
A. | OSI model |
B. | Hybrid model |
C. | TCP/IP model |
D. | All of the above |
Answer» E. | |
40. |
Which of the following congestion control will not give converge in TCP congestion avoidance? |
A. | MIMD |
B. | AIAD |
C. | Both a and b |
D. | AIMD |
Answer» D. AIMD | |
41. |
Which of the following aspects is/are mostly covered in the FEC? |
A. | How many packets are there. |
B. | What type of service class is there |
C. | Which packets are going to be used. |
D. | Where the packets are going. |
Answer» E. | |
42. |
Which of the following are the HTTP methods (request types)? I. GET II. POST III. PATCH IV. BODY V. CREATE VI. OPTION |
A. | I, II, III, IV, V |
B. | I, II |
C. | IV, V, VI |
D. | I, II, III, VI |
Answer» E. | |
43. |
Which information form/type is used for transferring the data in Packet switching? |
A. | Morse |
B. | ASCII |
C. | Binary |
D. | Baudot |
Answer» D. Baudot | |
44. |
Which connection does the OSI model support in networking? |
A. | Connection-oriented |
B. | Connectionless |
C. | Both a and b |
D. | None of the above |
Answer» D. None of the above | |
45. |
Which cell does Asynchronous Transfer Mode (ATM) use? |
A. | Bridges |
B. | Switches |
C. | Routers |
D. | Hubs |
Answer» C. Routers | |
46. |
Which architectures is/are required to QoS? |
A. | Integrated Services |
B. | Differentiated Services |
C. | Reserved Services |
D. | Both a and b |
E. | Both b and c |
Answer» E. Both b and c | |
47. |
Which algorithm is best for use in TCP congestion avoidance? |
A. | MIMD |
B. | AIAD |
C. | Both a and b |
D. | AlMD |
Answer» E. | |
48. |
When too many packets are present in a part of a subnet the performance degrades, this situation is called as Congestion. |
A. | True |
B. | False |
Answer» B. False | |
49. |
When hierarchical routing is used on the internet? |
A. | Total number of routers are divided into different regions. |
B. | Routers cannot handle network traffic efficiently. |
C. | Router increases the network size. |
D. | None of the above |
Answer» C. Router increases the network size. | |
50. |
What kind of task does MIME do in the SMTP protocol? |
A. | It only transfers the email and not receive them. |
B. | It transfers a message from the SMTP sender to the SMTP receiver over a TCP/IP. |
C. | It works under the Mail Transfer Agent (MAT). |
D. | It encodes the binary files and send. |
Answer» E. | |