MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 11

Choose a topic to test your knowledge and improve your MCA skills

1. Voice privacy in GSM cellular telephone protocol is provided by _______




2. ElGamal encryption system is _______




3. Cryptographic hash function takes an arbitrary block of data and returns _________




4. In the network HTTP resources are located by ______




5. FTP server listens for connection on which port number?




6. In FTP protocol, a client contacts a server using ______ as the transport protocol.




7. Which methods are commonly used in Server Socket class?




8. Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?




9. The client in socket programming must know which information?




10. TCP, FTP, Telnet, SMTP, POP etc. are examples of _______




11. What does the java.net.InetAddress class represent?




12. Which classes are used for connection-less socket programming?




13. In Inet Address class, which method returns the host name of the IP Address?




14. Cookies were originally designed for _______




15. The Cookie manipulation is done using which property?




16. Which of the following explains Cookies nature?




17. Which attribute is used to extend the lifetime of a cookie?




18. Which of the following defines the Cookie visibility?




19. Which of the following can be used to configure the scope of the Cookie visibility?




20. How can you set a Cookie visibility scope to local Storage?




21. Which of the following is a Boolean cookie attribute?




22. Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?




23. What is the constraint on the data per cookie?




24. What does REST stand for?




25. Which of the following protocol is used by Restful web services as a medium of communication between client and server?




26. Which of the following is not a good practice to create a standard URI for a web service?




27. Which of the following HTTP methods should be idempotent in nature?




28. Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?




29. Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?




30. Which of the following annotation of JAX RS API is used to annotate a method used to create resource?




31. Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?




32. The term that is used to place packet in its route to its destination is called ______




33. A second technique to reduce routing table and simplify searching process is called _______




34. Next-Hop Method is used to reduce contents of a _________




35. Several techniques can make size of routing table manageable and also handle issues such as ______




36. Host-specific routing is used for purposes such as checking route or providing _____




37. . In Unicast routing, if instability is between three nodes, stability cannot be _______




38. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________




39. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________




40. RPF stands for ______




41. LSP stands for ______




42. IPSec is designed to provide security at the _________




43. Network layer firewall works as a ________




44. Network layer firewall has two sub-categories called ____________




45. Open Shortest Path First (OSPF) is also called as _______




46. The computation of the shortest path in OSPF is usually done by ______




47. Which of the following is false with respect to the features of OSPF?




48. In OSPF, which protocol is used to discover neighbour routers automatically?




49. Which of the following is not a type of OSPF packet?




50. In OSPF header, which field is used to detect errors in the packet?