MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 11

Choose a topic to test your knowledge and improve your MCA skills

Voice privacy in GSM cellular telephone protocol is provided by _______





✅ Correct Answer: 1

ElGamal encryption system is _______





✅ Correct Answer: 2

Cryptographic hash function takes an arbitrary block of data and returns _________





✅ Correct Answer: 1

In the network HTTP resources are located by ______





✅ Correct Answer: 1

FTP server listens for connection on which port number?





✅ Correct Answer: 2

In FTP protocol, a client contacts a server using ______ as the transport protocol.





✅ Correct Answer: 1

Which methods are commonly used in Server Socket class?





✅ Correct Answer: 2

Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?





✅ Correct Answer: 2

The client in socket programming must know which information?





✅ Correct Answer: 3

TCP, FTP, Telnet, SMTP, POP etc. are examples of _______





✅ Correct Answer: 3

What does the java.net.InetAddress class represent?





✅ Correct Answer: 2

Which classes are used for connection-less socket programming?





✅ Correct Answer: 3

In Inet Address class, which method returns the host name of the IP Address?





✅ Correct Answer: 1

Cookies were originally designed for _______





✅ Correct Answer: 2

The Cookie manipulation is done using which property?





✅ Correct Answer: 1

Which of the following explains Cookies nature?





✅ Correct Answer: 4

Which attribute is used to extend the lifetime of a cookie?





✅ Correct Answer: 3

Which of the following defines the Cookie visibility?





✅ Correct Answer: 4

Which of the following can be used to configure the scope of the Cookie visibility?





✅ Correct Answer: 4

How can you set a Cookie visibility scope to local Storage?





✅ Correct Answer: 1

Which of the following is a Boolean cookie attribute?





✅ Correct Answer: 2

Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?





✅ Correct Answer: 1

What is the constraint on the data per cookie?





✅ Correct Answer: 3

What does REST stand for?





✅ Correct Answer: 2

Which of the following protocol is used by Restful web services as a medium of communication between client and server?





✅ Correct Answer: 1

Which of the following is not a good practice to create a standard URI for a web service?





✅ Correct Answer: 3

Which of the following HTTP methods should be idempotent in nature?





✅ Correct Answer: 4

Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?





✅ Correct Answer: 2

Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?





✅ Correct Answer: 2

Which of the following annotation of JAX RS API is used to annotate a method used to create resource?





✅ Correct Answer: 3

Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?





✅ Correct Answer: 3

The term that is used to place packet in its route to its destination is called ______





✅ Correct Answer: 3

A second technique to reduce routing table and simplify searching process is called _______





✅ Correct Answer: 1

Next-Hop Method is used to reduce contents of a _________





✅ Correct Answer: 3

Several techniques can make size of routing table manageable and also handle issues such as ______





✅ Correct Answer: 4

Host-specific routing is used for purposes such as checking route or providing _____





✅ Correct Answer: 2

. In Unicast routing, if instability is between three nodes, stability cannot be _______





✅ Correct Answer: 3

In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________





✅ Correct Answer: 1

In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________





✅ Correct Answer: 2

RPF stands for ______





✅ Correct Answer: 1

LSP stands for ______





✅ Correct Answer: 2

IPSec is designed to provide security at the _________





✅ Correct Answer: 2

Network layer firewall works as a ________





✅ Correct Answer: 2

Network layer firewall has two sub-categories called ____________





✅ Correct Answer: 1

Open Shortest Path First (OSPF) is also called as _______





✅ Correct Answer: 1

The computation of the shortest path in OSPF is usually done by ______





✅ Correct Answer: 3

Which of the following is false with respect to the features of OSPF?





✅ Correct Answer: 1

In OSPF, which protocol is used to discover neighbour routers automatically?





✅ Correct Answer: 4

Which of the following is not a type of OSPF packet?





✅ Correct Answer: 3

In OSPF header, which field is used to detect errors in the packet?





✅ Correct Answer: 4