Computer Networks Set 4 (30 mcqs)

1. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned

2. Dynamic web page
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both (a) and (b)
d) none of the mentioned

3. What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned

4. Common gateway interface is used to
a) generate executable files from web content by web server
b) generate web pages
c) stream videos
d) none of the mentioned

5. URL stands for
a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator

6. A web cookie is a small piece of data
a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) none of the mentioned

7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned

8. An alternative of javascript on windows platform is
a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned

9. What is document object model (DOM)?
a) convention for representing and interacting with objects in html documents
b) application programming interface
c) hierarchy of objects in ASP.NET
d) none of the mentioned

10. AJAX stands for
a) asynchronous javascript and xml
b) advanced JSP and xml
c) asynchronous JSP and xml
d) advanced javascript and xml

11) Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned

12) In this topology there is a central controller or hub
a) Star
b) Mesh
c) Ring
d) Bus

13) This topology requires multipoint connection
a) Star
b) Mesh
c) Ring
d) Bus

14) Data communication system spanning states, countries, or the whole world is
a) LAN
b) WAN
c) MAN
d) None of the mentioned
.
15) Data communication system within a building or campus is
a) LAN
b) WAN
c) MAN
d) None of the mentioned

16) Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned

17) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned

18) The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5

19) Find the FTP reply whose message is wrongly matched
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection

20) Mode of data transfer in FTP, where all the is left to TCP
a) Stream mode
b) Block mode
c) Compressed mode
d) None of the mentioned

21. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned

22. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network

23. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned

24. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned

25. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned

26. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned

27. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol

28. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher

29. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned

30. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned

 

Answers
1-b 2-b 3-d 4-a 5-c
6-a 7-d 8-a 9-a 10-a
11-a 12-a 13-d 14-b 15-a
16-b 17-a 18-b 19-d 20-a
21-a 22-b 23-c 24-a 25-a
26-a 27-b 28-a 29-b 30-a
Spread the love

Leave a Comment

Your email address will not be published. Required fields are marked *