MCA/Computer Network MCA Question MCQ Set 11 Sample Test,Sample questions

Question:
 In FTP protocol, a client contacts a server using ______ as the transport protocol.

1.Transmission control protocol

2.User datagram protocol

3.Datagram congestion control protocol

4. Stream control transmission protocol

Posted Date:-2021-12-28 07:09:23


Question:
 In OSPF, which protocol is used to discover neighbour routers automatically?

1. Link state protocol

2.Error-correction protocol

3.Routing information protocol

4.Hello protocol

Posted Date:-2021-12-28 07:35:41


Question:
 IPSec is designed to provide security at the _________

1. transport layer

2.network layer

3.application layer

4. session layer

Posted Date:-2021-12-28 07:31:15


Question:
 Network layer firewall works as a ________

1.frame filter

2.packet filter

3.signal filter

4. content filter

Posted Date:-2021-12-28 07:32:10


Question:
 Which classes are used for connection-less socket programming?

1. Datagram Socket

2.Datagram Packet

3.Both Datagram Socket & Datagram Packet

4.Server Socket

Posted Date:-2021-12-28 07:15:47


Question:
 Which of the following annotation of JAX RS API is used to annotate a method used to create resource?

1. @Path

2. @GET

3.@PUT

4.@POST

Posted Date:-2021-12-28 07:24:47


Question:
 Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?

1.Public

2. Private

3.Nocache/nostore

4.Maxage

Posted Date:-2021-12-28 07:24:01


Question:
. In Unicast routing, if instability is between three nodes, stability cannot be _______

1.Stable

2.Reversed

3.Guaranteed

4.Forward

Posted Date:-2021-12-28 07:28:31


Question:
A second technique to reduce routing table and simplify searching process is called _______

1.Network-Specific Method

2. Network-Specific Motion

3.Network-Specific Maintaining

4.Network-Specific Membership

Posted Date:-2021-12-28 07:26:13


Question:
Cookies were originally designed for _______

1. Client side programming

2.Server side programming

3.Both Client side programming and Server side programming

4.Socket programming

Posted Date:-2021-12-28 07:16:49


Question:
Cryptographic hash function takes an arbitrary block of data and returns _________

1.fixed size bit string

2.variable size bit string

3.both fixed size bit string and variable size bit string

4.variable sized byte string

Posted Date:-2021-12-28 07:06:43


Question:
ElGamal encryption system is _______

1.symmetric key encryption algorithm

2. asymmetric key encryption algorithm

3.not an encryption algorithm

4.block cipher method

Posted Date:-2021-12-28 07:06:20


Question:
FTP server listens for connection on which port number?

1.20

2. 21

3.22

4.23

Posted Date:-2021-12-28 07:08:20


Question:
Host-specific routing is used for purposes such as checking route or providing _____

1. Network Measures

2. Security Measures

3.Routing Measures

4.Delivery Measures

Posted Date:-2021-12-28 07:28:04


Question:
How can you set a Cookie visibility scope to local Storage?

1. /

2.%

3.*

4.#

Posted Date:-2021-12-28 07:19:48


Question:
In Inet Address class, which method returns the host name of the IP Address?

1. Public String get Hostname()

2.Public String getHostAddress()

3.Public static InetAddress get Localhost()

4.Public getByName()

Posted Date:-2021-12-28 07:16:12


Question:
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________

1.Gaps

2. Loops

3. Holes

4.Links

Posted Date:-2021-12-28 07:29:35


Question:
In OSPF header, which field is used to detect errors in the packet?

1. Type

2.Area ID

3.Authentication type

4.Checksum

Posted Date:-2021-12-28 07:36:42


Question:
In the network HTTP resources are located by ______

1.Uniform resource identifier

2.Unique resource locator

3.Unique resource identifier

4.union resource locator

Posted Date:-2021-12-28 07:07:34


Question:
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________

1. Graph

2. Tree

3.Network

4. Link

Posted Date:-2021-12-28 07:28:56


Question:
LSP stands for ______

1. Link Stable Packet

2.Link State Packet

3.Link State Protocol

4.Link State Path

Posted Date:-2021-12-28 07:30:30


Question:
Network layer firewall has two sub-categories called ____________

1.stateful firewall and stateless firewall

2. bit oriented firewall and byte oriented firewall

3.frame firewall and packet firewall

4.network firewall and data firewall

Posted Date:-2021-12-28 07:32:38


Question:
Next-Hop Method is used to reduce contents of a _________

1.Revolving table

2. Rotating Table

3.Routing Table

4.Re-allocate table

Posted Date:-2021-12-28 07:26:42


Question:
Open Shortest Path First (OSPF) is also called as _______

1. Link state protocol

2.Error-correction protocol

3.Routing information protocol

4.Border gateway protocol

Posted Date:-2021-12-28 07:34:15


Question:
RPF stands for ______

1.Reverse Path Forwarding

2.Reverse Path Failure

3.Reverse Packet Forwarding

4.Reverse Protocol Failure

Posted Date:-2021-12-28 07:30:01


Question:
Several techniques can make size of routing table manageable and also handle issues such as ______

1.Maturity

2.Error reporting

3.Tunneling

4.Security

Posted Date:-2021-12-28 07:27:22


Question:
TCP, FTP, Telnet, SMTP, POP etc. are examples of _______

1. Socket

2.IP Address

3.Protocol

4.MAC Address

Posted Date:-2021-12-28 07:14:52


Question:
The client in socket programming must know which information?

1.IP address of Server

2.Port number

3. Both IP address of Server & Port number

4.Only its own IP address

Posted Date:-2021-12-28 07:14:24


Question:
The computation of the shortest path in OSPF is usually done by ______

1. Bellman-ford algorithm

2.Routing information protocol

3.Dijkstra’s algorithm

4. Distance vector routing

Posted Date:-2021-12-28 07:34:41


Question:
The Cookie manipulation is done using which property?

1.cookie

2.cookies

3.manipulate

4.manipulate cookie

Posted Date:-2021-12-28 07:17:19


Question:
The term that is used to place packet in its route to its destination is called ______

1.Delayed

2. Urgent

3.Forwarding

4.Delivering

Posted Date:-2021-12-28 07:25:47


Question:
Voice privacy in GSM cellular telephone protocol is provided by _______

1. A5/2 cipher

2. b5/4 cipher

3.b5/6 cipher

4. b5/8 cipher

Posted Date:-2021-12-28 07:05:56


Question:
What does REST stand for?

1.Represent State Transfer

2. Representational State Transfer

3.Representing State Transfer

4.Representation State Transfer

Posted Date:-2021-12-28 07:22:06


Question:
What does the java.net.InetAddress class represent?

1. Socket

2.IP Address

3.Protocol

4.MAC Address

Posted Date:-2021-12-28 07:15:23


Question:
What is the constraint on the data per cookie?

1. 2 KB

2. 1 KB

3.4 KB

4.3 KB

Posted Date:-2021-12-28 07:21:01


Question:
Which attribute is used to extend the lifetime of a cookie?

1. Higher-age

2. Increase-age

3.Max-age

4.Lifetime

Posted Date:-2021-12-28 07:18:26


Question:
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?

1. Datagram Socket(int port)

2.Datagram Socket(int port, Int Address address)

3.Datagram Socket()

4.Datagram Socket(int address)

Posted Date:-2021-12-28 07:14:02


Question:
Which methods are commonly used in Server Socket class?

1.Public Output Stream get Output Stream ()

2.Public Socket accept ()

3. Public synchronized void close ()

4.Public void connect ()

Posted Date:-2021-12-28 07:10:39


Question:
Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?

1.@PathParam

2.@QueryParam

3.@MatrixParam

4.@HeaderParam

Posted Date:-2021-12-28 07:25:10


Question:
Which of the following can be used to configure the scope of the Cookie visibility?

1.Path

2.Domain

3.Both Path and Domain

4.Server

Posted Date:-2021-12-28 07:19:21


Question:
Which of the following defines the Cookie visibility?

1. Document Path

2.LocalStorage

3. SessionStorage

4.all of the mentioned

Posted Date:-2021-12-28 07:18:55


Question:
Which of the following explains Cookies nature?

1.Non Volatile

2.Volatile

3.Intransient

4. Transient

Posted Date:-2021-12-28 07:17:45


Question:
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?

1.EncodeURIComponent()

2.EncodeURI()

3.EncodeComponent()

4.Encode()

Posted Date:-2021-12-28 07:20:35


Question:
Which of the following HTTP methods should be idempotent in nature?

1. OPTIONS

2.DELETE

3.POST

4.HEAD

Posted Date:-2021-12-28 07:23:34


Question:
Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?

1.200

2.201

3.204

4.304

Posted Date:-2021-12-28 07:24:24


Question:
Which of the following is a Boolean cookie attribute?

1.Bool

2. Secure

3.Lookup

4.Domain

Posted Date:-2021-12-28 07:20:12


Question:
Which of the following is false with respect to the features of OSPF?

1.Support for fixed-length subnetting by including the subnet mask in the routing message

2.More flexible link cost than can range from 1 to 65535

3.Use of designated router

4.Distribution of traffic over multiple paths that have equal cost to the destination

Posted Date:-2021-12-28 07:35:15


Question:
Which of the following is not a good practice to create a standard URI for a web service?

1. Maintain Backward Compatibility

2.Use HTTP Verb

3. Using spaces for long resource names

4.Use lowercase letters

Posted Date:-2021-12-28 07:23:07


Question:
Which of the following is not a type of OSPF packet?

1. Hello

2.Link-state request

3.Link-state response

4.Link-state ACK

Posted Date:-2021-12-28 07:36:13


Question:
Which of the following protocol is used by Restful web services as a medium of communication between client and server?

1.HTTP

2.FTP

3.Gopher

4.TELNET

Posted Date:-2021-12-28 07:22:42


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
  15. MCA MCQ Question
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!