In FTP protocol, a client contacts a server using ______ as the transport protocol.
1.Transmission control protocol
2.User datagram protocol
3.Datagram congestion control protocol
4. Stream control transmission protocol
Posted Date:-2021-12-28 07:09:23
In OSPF, which protocol is used to discover neighbour routers automatically?
1. Link state protocol
2.Error-correction protocol
3.Routing information protocol
4.Hello protocol
Posted Date:-2021-12-28 07:35:41
IPSec is designed to provide security at the _________
1. transport layer
2.network layer
3.application layer
4. session layer
Posted Date:-2021-12-28 07:31:15
Network layer firewall works as a ________
1.frame filter
2.packet filter
3.signal filter
4. content filter
Posted Date:-2021-12-28 07:32:10
Which classes are used for connection-less socket programming?
1. Datagram Socket
2.Datagram Packet
3.Both Datagram Socket & Datagram Packet
4.Server Socket
Posted Date:-2021-12-28 07:15:47
Which of the following annotation of JAX RS API is used to annotate a method used to create resource?
1. @Path
2. @GET
3.@PUT
4.@POST
Posted Date:-2021-12-28 07:24:47
Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?
1.Public
2. Private
3.Nocache/nostore
4.Maxage
Posted Date:-2021-12-28 07:24:01
. In Unicast routing, if instability is between three nodes, stability cannot be _______
1.Stable
2.Reversed
3.Guaranteed
4.Forward
Posted Date:-2021-12-28 07:28:31
A second technique to reduce routing table and simplify searching process is called _______
1.Network-Specific Method
2. Network-Specific Motion
3.Network-Specific Maintaining
4.Network-Specific Membership
Posted Date:-2021-12-28 07:26:13
Cookies were originally designed for _______
1. Client side programming
2.Server side programming
3.Both Client side programming and Server side programming
4.Socket programming
Posted Date:-2021-12-28 07:16:49
Cryptographic hash function takes an arbitrary block of data and returns _________
1.fixed size bit string
2.variable size bit string
3.both fixed size bit string and variable size bit string
4.variable sized byte string
Posted Date:-2021-12-28 07:06:43
ElGamal encryption system is _______
1.symmetric key encryption algorithm
2. asymmetric key encryption algorithm
3.not an encryption algorithm
4.block cipher method
Posted Date:-2021-12-28 07:06:20
FTP server listens for connection on which port number?
1.20
2. 21
3.22
4.23
Posted Date:-2021-12-28 07:08:20
Host-specific routing is used for purposes such as checking route or providing _____
1. Network Measures
2. Security Measures
3.Routing Measures
4.Delivery Measures
Posted Date:-2021-12-28 07:28:04
How can you set a Cookie visibility scope to local Storage?
1. /
2.%
3.*
4.#
Posted Date:-2021-12-28 07:19:48
In Inet Address class, which method returns the host name of the IP Address?
1. Public String get Hostname()
2.Public String getHostAddress()
3.Public static InetAddress get Localhost()
4.Public getByName()
Posted Date:-2021-12-28 07:16:12
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________
1.Gaps
2. Loops
3. Holes
4.Links
Posted Date:-2021-12-28 07:29:35
In OSPF header, which field is used to detect errors in the packet?
1. Type
2.Area ID
3.Authentication type
4.Checksum
Posted Date:-2021-12-28 07:36:42
In the network HTTP resources are located by ______
1.Uniform resource identifier
2.Unique resource locator
3.Unique resource identifier
4.union resource locator
Posted Date:-2021-12-28 07:07:34
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
1. Graph
2. Tree
3.Network
4. Link
Posted Date:-2021-12-28 07:28:56
LSP stands for ______
1. Link Stable Packet
2.Link State Packet
3.Link State Protocol
4.Link State Path
Posted Date:-2021-12-28 07:30:30
Network layer firewall has two sub-categories called ____________
1.stateful firewall and stateless firewall
2. bit oriented firewall and byte oriented firewall
3.frame firewall and packet firewall
4.network firewall and data firewall
Posted Date:-2021-12-28 07:32:38
Next-Hop Method is used to reduce contents of a _________
1.Revolving table
2. Rotating Table
3.Routing Table
4.Re-allocate table
Posted Date:-2021-12-28 07:26:42
Open Shortest Path First (OSPF) is also called as _______
1. Link state protocol
2.Error-correction protocol
3.Routing information protocol
4.Border gateway protocol
Posted Date:-2021-12-28 07:34:15
RPF stands for ______
1.Reverse Path Forwarding
2.Reverse Path Failure
3.Reverse Packet Forwarding
4.Reverse Protocol Failure
Posted Date:-2021-12-28 07:30:01
Several techniques can make size of routing table manageable and also handle issues such as ______
1.Maturity
2.Error reporting
3.Tunneling
4.Security
Posted Date:-2021-12-28 07:27:22
TCP, FTP, Telnet, SMTP, POP etc. are examples of _______
1. Socket
2.IP Address
3.Protocol
4.MAC Address
Posted Date:-2021-12-28 07:14:52
The client in socket programming must know which information?
1.IP address of Server
2.Port number
3. Both IP address of Server & Port number
4.Only its own IP address
Posted Date:-2021-12-28 07:14:24
The computation of the shortest path in OSPF is usually done by ______
1. Bellman-ford algorithm
2.Routing information protocol
3.Dijkstra’s algorithm
4. Distance vector routing
Posted Date:-2021-12-28 07:34:41
The Cookie manipulation is done using which property?
1.cookie
2.cookies
3.manipulate
4.manipulate cookie
Posted Date:-2021-12-28 07:17:19
The term that is used to place packet in its route to its destination is called ______
1.Delayed
2. Urgent
3.Forwarding
4.Delivering
Posted Date:-2021-12-28 07:25:47
Voice privacy in GSM cellular telephone protocol is provided by _______
1. A5/2 cipher
2. b5/4 cipher
3.b5/6 cipher
4. b5/8 cipher
Posted Date:-2021-12-28 07:05:56
What does REST stand for?
1.Represent State Transfer
2. Representational State Transfer
3.Representing State Transfer
4.Representation State Transfer
Posted Date:-2021-12-28 07:22:06
What does the java.net.InetAddress class represent?
1. Socket
2.IP Address
3.Protocol
4.MAC Address
Posted Date:-2021-12-28 07:15:23
What is the constraint on the data per cookie?
1. 2 KB
2. 1 KB
3.4 KB
4.3 KB
Posted Date:-2021-12-28 07:21:01
Which attribute is used to extend the lifetime of a cookie?
1. Higher-age
2. Increase-age
3.Max-age
4.Lifetime
Posted Date:-2021-12-28 07:18:26
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?
1. Datagram Socket(int port)
2.Datagram Socket(int port, Int Address address)
3.Datagram Socket()
4.Datagram Socket(int address)
Posted Date:-2021-12-28 07:14:02
Which methods are commonly used in Server Socket class?
1.Public Output Stream get Output Stream ()
2.Public Socket accept ()
3. Public synchronized void close ()
4.Public void connect ()
Posted Date:-2021-12-28 07:10:39
Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?
1.@PathParam
2.@QueryParam
3.@MatrixParam
4.@HeaderParam
Posted Date:-2021-12-28 07:25:10
Which of the following can be used to configure the scope of the Cookie visibility?
1.Path
2.Domain
3.Both Path and Domain
4.Server
Posted Date:-2021-12-28 07:19:21
Which of the following defines the Cookie visibility?
1. Document Path
2.LocalStorage
3. SessionStorage
4.all of the mentioned
Posted Date:-2021-12-28 07:18:55
Which of the following explains Cookies nature?
1.Non Volatile
2.Volatile
3.Intransient
4. Transient
Posted Date:-2021-12-28 07:17:45
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?
1.EncodeURIComponent()
2.EncodeURI()
3.EncodeComponent()
4.Encode()
Posted Date:-2021-12-28 07:20:35
Which of the following HTTP methods should be idempotent in nature?
1. OPTIONS
2.DELETE
3.POST
4.HEAD
Posted Date:-2021-12-28 07:23:34
Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?
1.200
2.201
3.204
4.304
Posted Date:-2021-12-28 07:24:24
Which of the following is a Boolean cookie attribute?
1.Bool
2. Secure
3.Lookup
4.Domain
Posted Date:-2021-12-28 07:20:12
Which of the following is false with respect to the features of OSPF?
1.Support for fixed-length subnetting by including the subnet mask in the routing message
2.More flexible link cost than can range from 1 to 65535
3.Use of designated router
4.Distribution of traffic over multiple paths that have equal cost to the destination
Posted Date:-2021-12-28 07:35:15
Which of the following is not a good practice to create a standard URI for a web service?
1. Maintain Backward Compatibility
2.Use HTTP Verb
3. Using spaces for long resource names
4.Use lowercase letters
Posted Date:-2021-12-28 07:23:07
Which of the following is not a type of OSPF packet?
1. Hello
2.Link-state request
3.Link-state response
4.Link-state ACK
Posted Date:-2021-12-28 07:36:13
Which of the following protocol is used by Restful web services as a medium of communication between client and server?
1.HTTP
2.FTP
3.Gopher
4.TELNET
Posted Date:-2021-12-28 07:22:42