FREE COMPUTER MCQs by General knowledge Solutions
FREE COMPUTER MCQs by General knowledge Solutions
1. The values GET, POST, HEAD etc are specified in ____ of
HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body View Answer
Answer: a Explanation: It is specified in the method field of request line in the HTTP request message.
2. The ______ method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: b Explanation: None.
3. The HTTP response message leaves out the requested object when _____ method is used
a) GET
b) POST
c) HEAD
d) PUT View Answer
Answer: c Explanation: None.
4. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found View Answer
Answer: d Explanation: 404 Not Found.
5. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects View Answer
Answer: a Explanation: None.
6. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned View Answer
Answer: c Explanation: None.
7. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL c) Method
d) None of the mentioned View Answer
Answer: a Explanation: None. Computer Networks Questions & Answers – Network Utilities This set of Computer Networks Questions & Answers focuses on “Network Utilities”.
8. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned View Answer
Answer: d Explanation: None.
9. Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig View Answer
Answer: b Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.
10. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b View Answer
Answer: d Explanation: None.
11. _____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute View Answer
Answer: a Explanation: None.
12. If you want to find the number of routers between a source and destination, the utility to be used is. a) route
b) Ipconfig
c) Ifconfig
d) Traceroute View Answer
Answer: d Explanation: None.
13. Which of the following is related to ipconfig in Microsoft Windows ?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned View Answer
Answer: d Explanation: None.
14. This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned View Answer
Answer: a Explanation: None.
15. Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters View Answer
Answer: c Explanation: Pathping combines the functionality of ping with that of traceroute (tracert). Computer Networks Questions & Answers – FTP This set of Computer Networks Questions & Answers focuses on “FTP”.
16. Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned View Answer
Answer: b Explanation: None.
17. FTP is built on _____ architecture
a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: a Explanation: None.
18. FTP uses _____ parallel TCP connections to transfer a file
a) 1
b) 2
c) 3
d) 4 View Answer
Answer: b Explanation: Control connection and data connection.
19. Identify the incorrect statement
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection View Answer
Answer: c Explanation: FTP is out-of-band as it has separate control connection.
20. If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is
a) 5
b) 10
c) 2
d) 6 View Answer
Answer: d Explanation:
21. control connection and other 5 for five file transfers. 6) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned View Answer
Answer: a Explanation: None.
22. The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5 View Answer
Answer: b Explanation: None.
23. Find the FTP reply whose message is wrongly matched
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection View Answer
Answer: d Explanation: None.
24. Mode of data transfer in FTP, where all the is left to TCP
a) Stream mode
b) Block mode
c) Compressed mode
d) None of the mentioned View Answer
Answer: a Explanation: None.
25. The password is sent to the server using _____ command
a) PASSWD
b) PASS
c) PASSWORD
d) None of the mentioned View Answer
Answer: b Explanation: None. Computer Networks Questions & Answers – Network Attacks This set of Computer Networks Questions & Answers focuses on “Network Attacks”.
26. The attackers a network of compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net View Answer
Answer: b Explanation: None
27. Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer
Answer: d Explanation: None.
28. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer
Answer: c Explanation: None.
29.The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer
Answer: b Explanation: None.
30. Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: b Explanation: They donot inject packets into the channel.
a) Request line
b) Header line
c) Status line
d) Entity body View Answer
Answer: a Explanation: It is specified in the method field of request line in the HTTP request message.
2. The ______ method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: b Explanation: None.
3. The HTTP response message leaves out the requested object when _____ method is used
a) GET
b) POST
c) HEAD
d) PUT View Answer
Answer: c Explanation: None.
4. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found View Answer
Answer: d Explanation: 404 Not Found.
5. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects View Answer
Answer: a Explanation: None.
6. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned View Answer
Answer: c Explanation: None.
7. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL c) Method
d) None of the mentioned View Answer
Answer: a Explanation: None. Computer Networks Questions & Answers – Network Utilities This set of Computer Networks Questions & Answers focuses on “Network Utilities”.
8. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned View Answer
Answer: d Explanation: None.
9. Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig View Answer
Answer: b Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.
10. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b View Answer
Answer: d Explanation: None.
11. _____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute View Answer
Answer: a Explanation: None.
12. If you want to find the number of routers between a source and destination, the utility to be used is. a) route
b) Ipconfig
c) Ifconfig
d) Traceroute View Answer
Answer: d Explanation: None.
13. Which of the following is related to ipconfig in Microsoft Windows ?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned View Answer
Answer: d Explanation: None.
14. This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned View Answer
Answer: a Explanation: None.
15. Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters View Answer
Answer: c Explanation: Pathping combines the functionality of ping with that of traceroute (tracert). Computer Networks Questions & Answers – FTP This set of Computer Networks Questions & Answers focuses on “FTP”.
16. Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned View Answer
Answer: b Explanation: None.
17. FTP is built on _____ architecture
a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: a Explanation: None.
18. FTP uses _____ parallel TCP connections to transfer a file
a) 1
b) 2
c) 3
d) 4 View Answer
Answer: b Explanation: Control connection and data connection.
19. Identify the incorrect statement
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection View Answer
Answer: c Explanation: FTP is out-of-band as it has separate control connection.
20. If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is
a) 5
b) 10
c) 2
d) 6 View Answer
Answer: d Explanation:
21. control connection and other 5 for five file transfers. 6) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned View Answer
Answer: a Explanation: None.
22. The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5 View Answer
Answer: b Explanation: None.
23. Find the FTP reply whose message is wrongly matched
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection View Answer
Answer: d Explanation: None.
24. Mode of data transfer in FTP, where all the is left to TCP
a) Stream mode
b) Block mode
c) Compressed mode
d) None of the mentioned View Answer
Answer: a Explanation: None.
25. The password is sent to the server using _____ command
a) PASSWD
b) PASS
c) PASSWORD
d) None of the mentioned View Answer
Answer: b Explanation: None. Computer Networks Questions & Answers – Network Attacks This set of Computer Networks Questions & Answers focuses on “Network Attacks”.
26. The attackers a network of compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net View Answer
Answer: b Explanation: None
27. Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer
Answer: d Explanation: None.
28. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer
Answer: c Explanation: None.
29.The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned View Answer
Answer: b Explanation: None.
30. Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: b Explanation: They donot inject packets into the channel.
No comments