R4RIN
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 11
Choose a topic to test your knowledge and improve your MCA skills
1. Voice privacy in GSM cellular telephone protocol is provided by _______
A5/2 cipher
b5/4 cipher
b5/6 cipher
b5/8 cipher
2. ElGamal encryption system is _______
symmetric key encryption algorithm
asymmetric key encryption algorithm
not an encryption algorithm
block cipher method
3. Cryptographic hash function takes an arbitrary block of data and returns _________
fixed size bit string
variable size bit string
both fixed size bit string and variable size bit string
variable sized byte string
4. In the network HTTP resources are located by ______
Uniform resource identifier
Unique resource locator
Unique resource identifier
union resource locator
5. FTP server listens for connection on which port number?
20
21
22
23
6. In FTP protocol, a client contacts a server using ______ as the transport protocol.
Transmission control protocol
User datagram protocol
Datagram congestion control protocol
Stream control transmission protocol
7. Which methods are commonly used in Server Socket class?
Public Output Stream get Output Stream ()
Public Socket accept ()
Public synchronized void close ()
Public void connect ()
8. Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?
Datagram Socket(int port)
Datagram Socket(int port, Int Address address)
Datagram Socket()
Datagram Socket(int address)
9. The client in socket programming must know which information?
IP address of Server
Port number
Both IP address of Server & Port number
Only its own IP address
10. TCP, FTP, Telnet, SMTP, POP etc. are examples of _______
Socket
IP Address
Protocol
MAC Address
11. What does the java.net.InetAddress class represent?
Socket
IP Address
Protocol
MAC Address
12. Which classes are used for connection-less socket programming?
Datagram Socket
Datagram Packet
Both Datagram Socket & Datagram Packet
Server Socket
13. In Inet Address class, which method returns the host name of the IP Address?
Public String get Hostname()
Public String getHostAddress()
Public static InetAddress get Localhost()
Public getByName()
14. Cookies were originally designed for _______
Client side programming
Server side programming
Both Client side programming and Server side programming
Socket programming
15. The Cookie manipulation is done using which property?
cookie
cookies
manipulate
manipulate cookie
16. Which of the following explains Cookies nature?
Non Volatile
Volatile
Intransient
Transient
17. Which attribute is used to extend the lifetime of a cookie?
Higher-age
Increase-age
Max-age
Lifetime
18. Which of the following defines the Cookie visibility?
Document Path
LocalStorage
SessionStorage
all of the mentioned
19. Which of the following can be used to configure the scope of the Cookie visibility?
Path
Domain
Both Path and Domain
Server
20. How can you set a Cookie visibility scope to local Storage?
/
%
*
#
21. Which of the following is a Boolean cookie attribute?
Bool
Secure
Lookup
Domain
22. Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?
EncodeURIComponent()
EncodeURI()
EncodeComponent()
Encode()
23. What is the constraint on the data per cookie?
2 KB
1 KB
4 KB
3 KB
24. What does REST stand for?
Represent State Transfer
Representational State Transfer
Representing State Transfer
Representation State Transfer
25. Which of the following protocol is used by Restful web services as a medium of communication between client and server?
HTTP
FTP
Gopher
TELNET
26. Which of the following is not a good practice to create a standard URI for a web service?
Maintain Backward Compatibility
Use HTTP Verb
Using spaces for long resource names
Use lowercase letters
27. Which of the following HTTP methods should be idempotent in nature?
OPTIONS
DELETE
POST
HEAD
28. Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?
Public
Private
Nocache/nostore
Maxage
29. Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?
200
201
204
304
30. Which of the following annotation of JAX RS API is used to annotate a method used to create resource?
@Path
@GET
@PUT
@POST
31. Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?
@PathParam
@QueryParam
@MatrixParam
@HeaderParam
32. The term that is used to place packet in its route to its destination is called ______
Delayed
Urgent
Forwarding
Delivering
33. A second technique to reduce routing table and simplify searching process is called _______
Network-Specific Method
Network-Specific Motion
Network-Specific Maintaining
Network-Specific Membership
34. Next-Hop Method is used to reduce contents of a _________
Revolving table
Rotating Table
Routing Table
Re-allocate table
35. Several techniques can make size of routing table manageable and also handle issues such as ______
Maturity
Error reporting
Tunneling
Security
36. Host-specific routing is used for purposes such as checking route or providing _____
Network Measures
Security Measures
Routing Measures
Delivery Measures
37. . In Unicast routing, if instability is between three nodes, stability cannot be _______
Stable
Reversed
Guaranteed
Forward
38. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
Graph
Tree
Network
Link
39. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________
Gaps
Loops
Holes
Links
40. RPF stands for ______
Reverse Path Forwarding
Reverse Path Failure
Reverse Packet Forwarding
Reverse Protocol Failure
41. LSP stands for ______
Link Stable Packet
Link State Packet
Link State Protocol
Link State Path
42. IPSec is designed to provide security at the _________
transport layer
network layer
application layer
session layer
43. Network layer firewall works as a ________
frame filter
packet filter
signal filter
content filter
44. Network layer firewall has two sub-categories called ____________
stateful firewall and stateless firewall
bit oriented firewall and byte oriented firewall
frame firewall and packet firewall
network firewall and data firewall
45. Open Shortest Path First (OSPF) is also called as _______
Link state protocol
Error-correction protocol
Routing information protocol
Border gateway protocol
46. The computation of the shortest path in OSPF is usually done by ______
Bellman-ford algorithm
Routing information protocol
Dijkstra’s algorithm
Distance vector routing
47. Which of the following is false with respect to the features of OSPF?
Support for fixed-length subnetting by including the subnet mask in the routing message
More flexible link cost than can range from 1 to 65535
Use of designated router
Distribution of traffic over multiple paths that have equal cost to the destination
48. In OSPF, which protocol is used to discover neighbour routers automatically?
Link state protocol
Error-correction protocol
Routing information protocol
Hello protocol
49. Which of the following is not a type of OSPF packet?
Hello
Link-state request
Link-state response
Link-state ACK
50. In OSPF header, which field is used to detect errors in the packet?
Type
Area ID
Authentication type
Checksum
Submit