Breaking News

FREE COMPUTER MCQs by General knowledge Solutions

FREE COMPUTER MCQs    by General knowledge Solutions

                                                                                





1. The values GET, POST, HEAD etc are specified in ____ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body View Answer

 Answer: a Explanation: It is specified in the method field of request line in the HTTP request message.

2. The ______ method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
d) None of the mentioned View Answer

 Answer: b Explanation: None.

3. The HTTP response message leaves out the requested object when _____ method is used
a) GET
b) POST
c) HEAD
d) PUT View Answer

Answer: c Explanation: None.

4. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found View Answer

 Answer: d Explanation: 404 Not Found.

5. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects View Answer

 Answer: a Explanation: None.

6. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned View Answer

 Answer: c Explanation: None.

7. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL c) Method
d) None of the mentioned View Answer

 Answer: a Explanation: None. Computer Networks Questions & Answers – Network Utilities This set of Computer Networks Questions & Answers focuses on “Network Utilities”.

8. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned View Answer

 Answer: d Explanation: None.

9. Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig View Answer

 Answer: b Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.

10. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b View Answer
 Answer: d Explanation: None.

11. _____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute View Answer

 Answer: a Explanation: None.

12. If you want to find the number of routers between a source and destination, the utility to be used is. a) route
b) Ipconfig
c) Ifconfig
d) Traceroute View Answer

 Answer: d Explanation: None.

13. Which of the following is related to ipconfig in Microsoft Windows ?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned View Answer

 Answer: d Explanation: None.

14. This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned View Answer
Answer: a Explanation: None.

 15. Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters View Answer

 Answer: c Explanation: Pathping combines the functionality of ping with that of traceroute (tracert). Computer Networks Questions & Answers – FTP This set of Computer Networks Questions & Answers focuses on “FTP”.

16. Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned View Answer

Answer: b Explanation: None.

17. FTP is built on _____ architecture
a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned View Answer

Answer: a Explanation: None.

18. FTP uses _____ parallel TCP connections to transfer a file
 a) 1
 b) 2
 c) 3
 d) 4 View Answer

 Answer: b Explanation: Control connection and data connection.

19. Identify the incorrect statement

a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection View Answer

Answer: c Explanation: FTP is out-of-band as it has separate control connection.

20. If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is
a) 5
b) 10
c) 2
d) 6 View Answer

 Answer: d Explanation:

21. control connection and other 5 for five file transfers. 6) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned View Answer

 Answer: a Explanation: None.

22. The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5 View Answer

 Answer: b Explanation: None.

23. Find the FTP reply whose message is wrongly matched
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection View Answer

 Answer: d Explanation: None.

24. Mode of data transfer in FTP, where all the is left to TCP

 a) Stream mode
 b) Block mode
 c) Compressed mode
 d) None of the mentioned View Answer

 Answer: a Explanation: None.

25. The password is sent to the server using _____ command
a) PASSWD
b) PASS
c) PASSWORD
d) None of the mentioned View Answer

 Answer: b Explanation: None. Computer Networks Questions & Answers – Network Attacks This set of Computer Networks Questions & Answers focuses on “Network Attacks”.

26. The attackers a network of compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net View Answer

 Answer: b Explanation: None

27. Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer

 Answer: d Explanation: None.

28. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer

 Answer: c Explanation: None.

29.The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer

Answer: b Explanation: None.

30. Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned View Answer

 Answer: b Explanation: They donot inject packets into the channel.

No comments