MCA/Computer Network MCA Question MCQ Set 11 Sample Test,Sample questions

Question:
 In FTP protocol, a client contacts a server using ______ as the transport protocol.

1.Transmission control protocol

2.User datagram protocol

3.Datagram congestion control protocol

4. Stream control transmission protocol


Question:
 In OSPF, which protocol is used to discover neighbour routers automatically?

1. Link state protocol

2.Error-correction protocol

3.Routing information protocol

4.Hello protocol


Question:
 IPSec is designed to provide security at the _________

1. transport layer

2.network layer

3.application layer

4. session layer


Question:
 Network layer firewall works as a ________

1.frame filter

2.packet filter

3.signal filter

4. content filter


Question:
 Which classes are used for connection-less socket programming?

1. Datagram Socket

2.Datagram Packet

3.Both Datagram Socket & Datagram Packet

4.Server Socket


Question:
 Which of the following annotation of JAX RS API is used to annotate a method used to create resource?

1. @Path

2. @GET

3.@PUT

4.@POST


Question:
 Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?

1.Public

2. Private

3.Nocache/nostore

4.Maxage


Question:
. In Unicast routing, if instability is between three nodes, stability cannot be _______

1.Stable

2.Reversed

3.Guaranteed

4.Forward


Question:
A second technique to reduce routing table and simplify searching process is called _______

1.Network-Specific Method

2. Network-Specific Motion

3.Network-Specific Maintaining

4.Network-Specific Membership


Question:
Cookies were originally designed for _______

1. Client side programming

2.Server side programming

3.Both Client side programming and Server side programming

4.Socket programming


Question:
Cryptographic hash function takes an arbitrary block of data and returns _________

1.fixed size bit string

2.variable size bit string

3.both fixed size bit string and variable size bit string

4.variable sized byte string


Question:
ElGamal encryption system is _______

1.symmetric key encryption algorithm

2. asymmetric key encryption algorithm

3.not an encryption algorithm

4.block cipher method


Question:
FTP server listens for connection on which port number?

1.20

2. 21

3.22

4.23


Question:
Host-specific routing is used for purposes such as checking route or providing _____

1. Network Measures

2. Security Measures

3.Routing Measures

4.Delivery Measures


Question:
How can you set a Cookie visibility scope to local Storage?

1. /

2.%

3.*

4.#


Question:
In Inet Address class, which method returns the host name of the IP Address?

1. Public String get Hostname()

2.Public String getHostAddress()

3.Public static InetAddress get Localhost()

4.Public getByName()


Question:
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________

1.Gaps

2. Loops

3. Holes

4.Links


Question:
In OSPF header, which field is used to detect errors in the packet?

1. Type

2.Area ID

3.Authentication type

4.Checksum


Question:
In the network HTTP resources are located by ______

1.Uniform resource identifier

2.Unique resource locator

3.Unique resource identifier

4.union resource locator


Question:
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________

1. Graph

2. Tree

3.Network

4. Link


Question:
LSP stands for ______

1. Link Stable Packet

2.Link State Packet

3.Link State Protocol

4.Link State Path


Question:
Network layer firewall has two sub-categories called ____________

1.stateful firewall and stateless firewall

2. bit oriented firewall and byte oriented firewall

3.frame firewall and packet firewall

4.network firewall and data firewall


Question:
Next-Hop Method is used to reduce contents of a _________

1.Revolving table

2. Rotating Table

3.Routing Table

4.Re-allocate table


Question:
Open Shortest Path First (OSPF) is also called as _______

1. Link state protocol

2.Error-correction protocol

3.Routing information protocol

4.Border gateway protocol


Question:
RPF stands for ______

1.Reverse Path Forwarding

2.Reverse Path Failure

3.Reverse Packet Forwarding

4.Reverse Protocol Failure


Question:
Several techniques can make size of routing table manageable and also handle issues such as ______

1.Maturity

2.Error reporting

3.Tunneling

4.Security


Question:
TCP, FTP, Telnet, SMTP, POP etc. are examples of _______

1. Socket

2.IP Address

3.Protocol

4.MAC Address


Question:
The client in socket programming must know which information?

1.IP address of Server

2.Port number

3. Both IP address of Server & Port number

4.Only its own IP address


Question:
The computation of the shortest path in OSPF is usually done by ______

1. Bellman-ford algorithm

2.Routing information protocol

3.Dijkstra’s algorithm

4. Distance vector routing


Question:
The Cookie manipulation is done using which property?

1.cookie

2.cookies

3.manipulate

4.manipulate cookie


Question:
The term that is used to place packet in its route to its destination is called ______

1.Delayed

2. Urgent

3.Forwarding

4.Delivering


Question:
Voice privacy in GSM cellular telephone protocol is provided by _______

1. A5/2 cipher

2. b5/4 cipher

3.b5/6 cipher

4. b5/8 cipher


Question:
What does REST stand for?

1.Represent State Transfer

2. Representational State Transfer

3.Representing State Transfer

4.Representation State Transfer


Question:
What does the java.net.InetAddress class represent?

1. Socket

2.IP Address

3.Protocol

4.MAC Address


Question:
What is the constraint on the data per cookie?

1. 2 KB

2. 1 KB

3.4 KB

4.3 KB


Question:
Which attribute is used to extend the lifetime of a cookie?

1. Higher-age

2. Increase-age

3.Max-age

4.Lifetime


Question:
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?

1. Datagram Socket(int port)

2.Datagram Socket(int port, Int Address address)

3.Datagram Socket()

4.Datagram Socket(int address)


Question:
Which methods are commonly used in Server Socket class?

1.Public Output Stream get Output Stream ()

2.Public Socket accept ()

3. Public synchronized void close ()

4.Public void connect ()


Question:
Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?

1.@PathParam

2.@QueryParam

3.@MatrixParam

4.@HeaderParam


Question:
Which of the following can be used to configure the scope of the Cookie visibility?

1.Path

2.Domain

3.Both Path and Domain

4.Server


Question:
Which of the following defines the Cookie visibility?

1. Document Path

2.LocalStorage

3. SessionStorage

4.all of the mentioned


Question:
Which of the following explains Cookies nature?

1.Non Volatile

2.Volatile

3.Intransient

4. Transient


Question:
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?

1.EncodeURIComponent()

2.EncodeURI()

3.EncodeComponent()

4.Encode()


Question:
Which of the following HTTP methods should be idempotent in nature?

1. OPTIONS

2.DELETE

3.POST

4.HEAD


Question:
Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?

1.200

2.201

3.204

4.304


Question:
Which of the following is a Boolean cookie attribute?

1.Bool

2. Secure

3.Lookup

4.Domain


Question:
Which of the following is false with respect to the features of OSPF?

1.Support for fixed-length subnetting by including the subnet mask in the routing message

2.More flexible link cost than can range from 1 to 65535

3.Use of designated router

4.Distribution of traffic over multiple paths that have equal cost to the destination


Question:
Which of the following is not a good practice to create a standard URI for a web service?

1. Maintain Backward Compatibility

2.Use HTTP Verb

3. Using spaces for long resource names

4.Use lowercase letters


Question:
Which of the following is not a type of OSPF packet?

1. Hello

2.Link-state request

3.Link-state response

4.Link-state ACK


Question:
Which of the following protocol is used by Restful web services as a medium of communication between client and server?

1.HTTP

2.FTP

3.Gopher

4.TELNET


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!