Beruflich Dokumente
Kultur Dokumente
✓ పో టీపరీక్షలకు ప్రిప్ేరయ్యే అభ్ేరధులకు "AtoZ Telugu News" App చాలా ఉపయోగపడుత ుంది. ఈ
APP లో పితిరోజు LATEST JOBS, డైలీ Curent Affairs, ఎపపటికపపపడు జరిగే మొతత ుం విదాే
సమాచారాన్ని ఈ APP లో UPDATE చేసత త ఉుంటాము.
✓ ఎపపటికపపపడు మీ చుటటుపకకల జరిగే తాజా వారత లను కూడా చతడవచుు. ఇపపడే మా App ను
Download చేసుక ుండి.
➢ App Link:
https://play.google.com/store/apps/details?id=com.app.atoznews
7.COMPUTER NETWORKS
1.Which statement is true regarding classless routing protocols?
a) The use of discontinuous networks is not allowed
b) The use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) RIPv2 supports classless routing
Answer: b
Explanation: Classful routing means that all hosts in the internetwork use the same mask.
Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also
support discontinuous networking.
Answer: d
Explanation: When a network goes down, the distance-vector routing protocol initiates route
poisoning by advertising the network with a metric of 16, or unreachable.
4. Which of the situations might not require require multiple routing protocols in a network?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
Answer: a
Explanation: One routing protocol to another, routers from multiple vendors,host-based routers
from multiple vendors.
5. Which two routing protocols can be redistributed into OSPF by a Cisco router?
a) IP EIGRP and AppleTalk EIGRP
b) AppleTalk EIGRP and RIPv2
c) RIPv2 and IP EIGRP
d) IPX RIP & AppleTalk EIGRP
Answer: c
Explanation: IP EIGRP, RIPv2. These can be redistributed into OSPF by a Cisco router.
6. Which is a reason for avoiding doing route redistribution on two routers between the
same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers
Answer: b
Explanation: Routing feedback is a reason for avoiding doing route redistribution on two routers
between the same two routing domains.
Answer: b
Explanation: Sources of routing information is the administrative distance rank.
Answer: c
Explanation: RIP V2 maintains neighbor adjacencies.
Answer: c
Explanation: EIGRProuting protocol implements the diffusing update algorithm.
10. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) All of the above
Answer: b
Explanation: RIPv2protocol should you select if the network diameter is more than 17 hops.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
advertisement
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
Answer: a
Explanation: None.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer: b
Explanation: None.
Answer: b
Explanation: None.
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) none of the mentioned
Answer: a
Explanation: None.
1. Multiple object can be sent over a TCP connection between client and server in
a) Persistent HTTP
b) Ponpersistent HTTP
c) Both Persistent HTTP and Ponpersistent HTTP
d) None of the mentioned
Answer: a
Explanation: hypertext transfer protocol is used for sending multiple objects over TCP
connection.
Answer: a
Explanation: HTTP works on application layer.
Answer: a
Explanation: HTTP resources are located by uniform resource identifier.
Answer: b
Explanation:HTTP client requests by establishing TCP connection to a particular port on the
server.
5. In HTTP pipelining
a) Multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) Multiple HTTP requests cannot be sent on a single TCP connection
c) Multiple HTTP requests are sent in a queue on a single TCP connection
d) None of the mentioned
Answer: a
Explanation: Multiple HTTP requests are sent on a single TCP connection without waiting for
the corresponding responses in HTTP pipelining.
Answer: b
Explanation: 21 is the port number of FTP.
7. In FTP protocol, client contacts server using _________ as the transport protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
Answer: a
Explanation: Client contacts server using TCP as the transport protocol.
Answer: b
Explanation: In passive mode the client initiates both the control and data connections.
Answer: c
Explanation: FTP is built on client server architecture.
Answer: d
Explanation: Data transfer can be done in stream, block and compressed modes
Answer: b
Explanation: Public Socket accept () used in Server Socket class.
2. Which constructor of Datagram Socket class is used to create a datagram socket and
binds it with the given Port Number?
a) Datagram Socket(int port)
b) Datagram Socket(int port, Int Address address)
c) Datagram Socket()
d) None of the mentioned
Answer: b
Explanation: Datagram Socket (int port, Int Address address) is use data create a datagram
socket.
4. The URL Connection class can be used to read and write data to the specified resource
referred by the URL
a) True
b) False
Answer: a
Explanation: The URL Connection class can be used to read and write data to the specified
resource referred by the URL.
Answer: a
Explanation: Datagram is basically an information but there is no guarantee of its content, arrival
or arrival time.
advertisement
Answer: c
Explanation: TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol.
Answer: b
Explanation: The java.net.InetAddress class represent IP Address.
Answer: a
Explanation: The flush () method of Print Stream class flushes any un cleared buffers in
memory.
Answer: c
Explanation: Datagram Socket, Datagram Packet are used for connection-less socket
programming.
10. In Int Address class which method returns the host name of the IP Address?
a) Public String get Hostname()
b) Public String getHostAddress()
c) Public static IntAddress get Localhost()
d) None of the mentioned
Answer: a
Explanation: In Int Address class public String get Hostname() method returns the host name of
the IP Address
Answer: b
Explanation: Cookies were originally designed for server side programming, and at the lowest
level, they are implemented as an extension to the HTTP protocol.
Answer: d
Explanation: Cookies are transient by default; the values they store last for the duration of the
web browser session but are lost when the user exits the browser.
Answer: c
Explanation: If you want a cookie to last beyond a single browsing session, you must tell the
browser how long (in seconds) you would like it to retain the cookie by specifying a manage
attribute. If you specify a lifetime, the browser will store cookies in a file and delete them only
once they expire.
Answer: d
Explanation: Cookie visibility is scoped by document origin as local Storage and session
Storage are, and also by document path.
6. Which of the following can be used to configure the scope of the Cookie visibility?
a) Path
b) Domain
c) Both Path and Domain
d) None of the mentioned
Answer: d
Explanation: The Cookie visibility scope is configurable through cookie attributes path and
domain.
Answer: a
Explanation: Setting the path of a cookie to “/” gives scoping like that of localStorage and also
specifies that the browser must transmit the cookie name and value to the server whenever it
requests any web page on the site.
Answer: b
Explanation: The final cookie attribute is a boolean attribute named secure that specifies how
cookie values are transmitted over the network. By default, cookies are insecure, which means
that they are transmitted over a normal, insecure HTTP connection. If a cookie is marked
secure, however, it is transmitted only when the browser and server are connected via HTTPS
or another secure protocol.
Answer: a
Explanation: Cookie values cannot include semicolons, commas, or whitespace. For this
reason, you may want to use the core JavaScript global function encodeURIComponent() to
encode the value before storing it in the cookie.
Answer: c
Explanation: Each cookie can hold upto only 4 KB. In practice, browsers allow many more than
300 cookies total, but the 4 KB size limit may still be enforced by some
Answer: b
Explanation: REST stands for Representational State Transfer.
t
Answer: a
Explanation: Restful web services make use of HTTP protocol as a medium of communication
between client and server.
3. Which of the following is a best practice to create a standard URI for a web service?
a) Maintain Backward Compatibility
b) Use HTTP Verb
c) Both of the mentioned
d) None of the mentioned
Answer: C
Explanation: Both of the above options are correct.
Answer: b
Explanation: DELETE operations should be idempotent, means their result will always same no
matter how many times these operations are invoked.
5. Which of the following directive of Cache Control Header of HTTP response indicates
that resource is cachable by only client and server?
a) Public
b) Private
c) Nocache/nostore
Answer: b
Explanation: Private directive indicates that resource is cachable by only client and server, no
intermediary can cache the resource.
6. Which of the following HTTP Status code means CREATED, when a resource is
successful created using POST or PUT request?
a) 200
b) 201
c) 204
d) 304
Answer: b
Explanation: HTTP Status Code 201 means CREATED, when a resource is successful created
using POST or PUT request.
7. Which of the following annotation of JAX RS API is used to annotate a method used to
create resource?
a) @Path
b) @GET
c) @PUT
d) @POST
Answer: C
Explanation: @PUT – HTTP Get request, used to create resource.
8. Which of the following annotation of JAX RS API binds the parameter passed to method
to a HTTP matrix parameter in path?
a) @PathParam
b) @QueryParam
c) @MatrixParam
d) @HeaderParam
Answer: c
Explanation: @MatrixParam – Binds the parameter passed to method to a HTTP matrix
parameter in path.
9. In REST architecture, a REST Server simply provides access to resources and REST
client accesses and presents the resources.
a) False
b) True
Answer: b
Explanation: In REST architecture, a REST Server simply provides access to resources and
REST client accesses and presents the resources.
Answer: b
Explanation: POST operation can cause different result
Answer: c
Explanation: It is for transforming the message from source to destination with forward
technique.
2. A second technique to reduce routing table and simplify searching process is called
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership
Answer: a
Explanation: It is the before method of the packet switching.
Answer: c
Explanation: This method is for creating the shortest distances.
4. Several techniques can make size of routing table manageable and also handle issues
such as
a) Maturity
b) Error reporting
c) Tunneling
d) Security
Answer: d
Explanation: To visible only accessing sub networks.
Answer: c
Explanation: It is only for unidirectional.
Answer: a
Explanation: Graph technique is used for best node finding technic with shortest path
algorithms.
Answer: b
Explanation: Loops is for multicast routing.
Answer: a
Explanation: Reverse Path Forwarding.
Answer: b
Explanation: None.
advertisement
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: b
Explanation: None.
9. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
Answer: a
Explanation: None.
..........................................................THE END.......................................................................