InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________(a) DNS lookup(b) DNS hijacking(c) DNS spoofing(d) DNS authorizingI had been asked this question in unit test.This key question is from Security In The Internet in section Networking of Computer Network |
|
Answer» The correct option is (C) DNS SPOOFING |
|
| 2. |
PGP encrypts data by using a block cipher called ______(a) international data encryption algorithm(b) private data encryption algorithm(c) internet data encryption algorithm(d) local data encryption algorithmThe question was posed to me during an online interview.My doubt is from Security In The Internet topic in portion Networking of Computer Network |
|
Answer» The CORRECT choice is (a) international data encryption algorithm |
|
| 3. |
Pretty good privacy (PGP) is used in ______(a) browser security(b) email security(c) FTP security(d) wifi securityThis question was posed to me in a national level competition.Origin of the question is Security In The Internet in portion Networking of Computer Network |
|
Answer» The CORRECT option is (b) email SECURITY |
|
| 4. |
Extensible authentication protocol is authentication framework frequently used in ______(a) wired personal area network(b) wireless networks(c) wired local area network(d) wired metropolitan area networkI had been asked this question during a job interview.Question is taken from Security In The Internet topic in chapter Networking of Computer Network |
|
Answer» Right answer is (b) wireless networks |
|
| 5. |
An attempt to make a computer resource unavailable to its intended users is called ______(a) denial-of-service attack(b) virus attack(c) worms attack(d) botnet processThe question was posed to me during an online interview.My doubt is from Security In The Internet in portion Networking of Computer Network |
|
Answer» The correct answer is (a) DENIAL-of-service ATTACK |
|
| 6. |
WPA2 is used for security in _______(a) ethernet(b) bluetooth(c) wi-fi(d) e-mailI had been asked this question in an internship interview.I'd like to ask this question from Security In The Internet in portion Networking of Computer Network |
|
Answer» RIGHT answer is (c) wi-fi For explanation I would say: WPA2 or WiFi Protected ACCESS 2 is a SECURITY PROTOCOL used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network. |
|
| 7. |
Network layer firewall has two sub-categories called ____________(a) stateful firewall and stateless firewall(b) bit oriented firewall and byte oriented firewall(c) frame firewall and packet firewall(d) network firewall and data firewallThe question was asked in examination.I need to ask this question from Security In The Internet in section Networking of Computer Network |
|
Answer» The correct choice is (a) STATEFUL firewall and STATELESS firewall |
|
| 8. |
Network layer firewall works as a ________(a) frame filter(b) packet filter(c) signal filter(d) content filterThe question was posed to me in homework.Origin of the question is Security In The Internet topic in section Networking of Computer Network |
|
Answer» Right ANSWER is (b) packet filter |
|
| 9. |
In tunnel mode, IPSec protects the ______(a) Entire IP packet(b) IP header(c) IP payload(d) IP trailerThe question was asked by my college director while I was bunking the class.I need to ask this question from Security In The Internet topic in section Networking of Computer Network |
|
Answer» Correct CHOICE is (a) Entire IP packet |
|
| 10. |
IPSec is designed to provide security at the _________(a) transport layer(b) network layer(c) application layer(d) session layerThis question was addressed to me by my college director while I was bunking the class.My question is taken from Security In The Internet topic in section Networking of Computer Network |
|
Answer» The correct option is (b) network layer |
|
| 11. |
LSP stands for __________(a) Link Stable Packet(b) Link State Packet(c) Link State Protocol(d) Link State PathThe question was posed to me during an interview.I'd like to ask this question from Packet Forwarding and Routing in section Networking of Computer Network |
|
Answer» Right answer is (b) Link State Packet |
|
| 12. |
RPF stands for __________(a) Reverse Path Forwarding(b) Reverse Path Failure(c) Reverse Packet Forwarding(d) Reverse Protocol FailureI got this question in an interview for internship.Question is taken from Packet Forwarding and Routing topic in division Networking of Computer Network |
|
Answer» The correct answer is (a) Reverse Path Forwarding |
|
| 13. |
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________(a) Gaps(b) Loops(c) Holes(d) LinksThis question was posed to me in homework.Asked question is from Packet Forwarding and Routing topic in division Networking of Computer Network |
|
Answer» The correct choice is (b) Loops |
|
| 14. |
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________(a) Graph(b) Tree(c) Network(d) LinkThe question was posed to me in semester exam.Origin of the question is Packet Forwarding and Routing in section Networking of Computer Network |
|
Answer» Right answer is (a) Graph |
|
| 15. |
In Unicast routing, if instability is between three nodes, stability cannot be ________(a) Stable(b) Reversed(c) Guaranteed(d) ForwardThe question was asked in an online interview.My question comes from Packet Forwarding and Routing in portion Networking of Computer Network |
|
Answer» Right option is (c) GUARANTEED |
|
| 16. |
Host-specific routing is used for purposes such as checking route or providing _____(a) Network Measures(b) Security Measures(c) Routing Measures(d) Delivery MeasuresI have been asked this question in an online interview.I'd like to ask this question from Packet Forwarding and Routing topic in chapter Networking of Computer Network |
|
Answer» Right answer is (B) Security Measures |
|
| 17. |
Several techniques can make size of routing table manageable and also handle issues such as __________(a) Maturity(b) Error reporting(c) Tunneling(d) SecurityThis question was addressed to me during an internship interview.My question comes from Packet Forwarding and Routing topic in chapter Networking of Computer Network |
|
Answer» The correct choice is (d) Security |
|
| 18. |
Next-Hop Method is used to reduce contents of a _________(a) Revolving table(b) Rotating Table(c) Routing Table(d) Re-allocate tableI got this question by my school principal while I was bunking the class.My enquiry is from Packet Forwarding and Routing in division Networking of Computer Network |
|
Answer» The correct choice is (c) Routing Table |
|
| 19. |
A second technique to reduce routing table and simplify searching process is called _________(a) Network-Specific Method(b) Network-Specific Motion(c) Network-Specific Maintaining(d) Network-Specific MembershipThe question was posed to me in a job interview.The query is from Packet Forwarding and Routing topic in section Networking of Computer Network |
|
Answer» CORRECT OPTION is (a) Network-Specific Method The best explanation: In the network specific forwarding method, there is only ONE RECORD, the destination of the PACKET, in the routing table and not the other hosts of the network. The other two forwarding methods are the default method and the next-hop method. |
|
| 20. |
The term that is used to place packet in its route to its destination is called __________(a) Delayed(b) Urgent(c) Forwarding(d) DeliveringThis question was addressed to me in my homework.Question is from Packet Forwarding and Routing topic in chapter Networking of Computer Network |
|
Answer» The correct choice is (c) Forwarding |
|
| 21. |
POST operation should be idempotent.(a) True(b) FalseI got this question by my college director while I was bunking the class.Origin of the question is Web Caching topic in section Networking of Computer Network |
|
Answer» Correct answer is (b) False |
|
| 22. |
In REST architecture, a REST Server simply provides access to resources and REST client accesses and presents the resources.(a) False(b) TrueI had been asked this question in a job interview.This question is from Web Caching in section Networking of Computer Network |
|
Answer» Correct answer is (B) True |
|
| 23. |
Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?(a) @PathParam(b) @QueryParam(c) @MatrixParam(d) @HeaderParamI have been asked this question during an internship interview.This interesting question is from Web Caching in portion Networking of Computer Network |
|
Answer» CORRECT choice is (c) @MatrixParam Explanation: @MatrixParam is the annotation that binds the parameter PASSED to method to a HTTP matrix parameter in PATH, while @QueryParam binds to a query parameter, @PathParam binds to a VALUE and @HeaderParam binds to the HTTP header in the path. |
|
| 24. |
Which of the following annotation of JAX RS API is used to annotate a method used to create resource?(a) @Path(b) @GET(c) @PUT(d) @POSTI had been asked this question in a national level competition.I need to ask this question from Web Caching in division Networking of Computer Network |
|
Answer» The correct OPTION is (c) @PUT |
|
| 25. |
Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?(a) 200(b) 201(c) 204(d) 304This question was addressed to me in examination.Enquiry is from Web Caching in section Networking of Computer Network |
|
Answer» Correct option is (b) 201 |
|
| 26. |
Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?(a) Public(b) Private(c) Nocache/nostore(d) MaxageThis question was addressed to me in an online quiz.My question is taken from Web Caching topic in section Networking of Computer Network |
|
Answer» Correct ANSWER is (b) PRIVATE |
|
| 27. |
Which of the following HTTP methods should be idempotent in nature?(a) OPTIONS(b) DELETE(c) POST(d) HEADThe question was asked in an online quiz.This interesting question is from Web Caching in division Networking of Computer Network |
|
Answer» The correct choice is (b) DELETE |
|
| 28. |
Which of the following is not a good practice to create a standard URI for a web service?(a) Maintain Backward Compatibility(b) Use HTTP Verb(c) Using spaces for long resource names(d) Use lowercase lettersI got this question in an online quiz.This interesting question is from Web Caching in chapter Networking of Computer Network |
|
Answer» CORRECT option is (c) Using spaces for long resource names To ELABORATE: We must use hyphens (-) or UNDERSCORES (_) instead of spaces to represent long resource names. It may lead to the resource to be less recognizable for the SYSTEM if we use spaces instead. |
|
| 29. |
Which of the following protocol is used by Restful web services as a medium of communication between client and server?(a) HTTP(b) FTP(c) Gopher(d) TELNETThis question was posed to me during an online interview.This is a very interesting question from Web Caching in section Networking of Computer Network |
|
Answer» Right answer is (a) HTTP |
|
| 30. |
What does REST stand for?(a) Represent State Transfer(b) Representational State Transfer(c) Representing State Transfer(d) Representation State TransferI got this question in my homework.My doubt is from Web Caching topic in section Networking of Computer Network |
|
Answer» The correct choice is (b) Representational State Transfer |
|
| 31. |
What is the constraint on the data per cookie?(a) 2 KB(b) 1 KB(c) 4 KB(d) 3 KBThe question was posed to me in an online interview.The origin of the question is Cookies in section Networking of Computer Network |
|
Answer» Correct choice is (c) 4 KB |
|
| 32. |
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?(a) EncodeURIComponent()(b) EncodeURI()(c) EncodeComponent()(d) Encode()I have been asked this question in unit test.My question comes from Cookies topic in portion Networking of Computer Network |
|
Answer» Correct choice is (a) EncodeURIComponent() |
|
| 33. |
Which of the following is a Boolean cookie attribute?(a) Bool(b) Secure(c) Lookup(d) DomainI got this question in an online interview.My enquiry is from Cookies in division Networking of Computer Network |
|
Answer» Right choice is (B) SECURE |
|
| 34. |
How can you set a Cookie visibility scope to local Storage?(a) /(b) %(c) *(d) #This question was posed to me in unit test.My question is from Cookies topic in portion Networking of Computer Network |
|
Answer» The correct OPTION is (a) / |
|
| 35. |
Which of the following can be used to configure the scope of the Cookie visibility?(a) Path(b) Domain(c) Both Pathand Domain(d) ServerThe question was posed to me during an interview for a job.I would like to ask this question from Cookies in section Networking of Computer Network |
|
Answer» Right ANSWER is (d) Server |
|
| 36. |
Which of the following defines the Cookie visibility?(a) Document Path(b) LocalStorage(c) SessionStorage(d) All of the mentionedThis question was addressed to me during an interview for a job.I need to ask this question from Cookies topic in division Networking of Computer Network |
|
Answer» Correct choice is (d) All of the mentioned |
|
| 37. |
Which attribute is used to extend the lifetime of a cookie?(a) Higher-age(b) Increase-age(c) Max-age(d) LifetimeThe question was asked in an international level competition.I'm obligated to ask this question of Cookies in portion Networking of Computer Network |
|
Answer» The correct CHOICE is (c) Max-age |
|
| 38. |
Which of the following explains Cookies nature?(a) Non Volatile(b) Volatile(c) Intransient(d) TransientThis question was posed to me in an interview for job.This interesting question is from Cookies topic in chapter Networking of Computer Network |
|
Answer» Correct choice is (d) Transient |
|
| 39. |
The Cookie manipulation is done using which property?(a) cookie(b) cookies(c) manipulate(d) manipulate cookieI had been asked this question in a national level competition.My doubt stems from Cookies in portion Networking of Computer Network |
|
Answer» The correct option is (a) cookie |
|
| 40. |
Cookies were originally designed for ____________(a) Client side programming(b) Server side programming(c) Both Client side programming and Server side programming(d) Socket programmingThis question was posed to me in a job interview.Question is taken from Cookies in portion Networking of Computer Network |
|
Answer» Right ANSWER is (B) Server SIDE programming |
|
| 41. |
Which classes are used for connection-less socket programming?(a) Datagram Socket(b) Datagram Packet(c) Both Datagram Socket & Datagram Packet(d) Server SocketI had been asked this question in a job interview.The query is from Socket Programming topic in portion Networking of Computer Network |
|
Answer» Correct option is (c) Both Datagram Socket & Datagram PACKET |
|
| 42. |
In Inet Address class, which method returns the host name of the IP Address?(a) Public String get Hostname()(b) Public String getHostAddress()(c) Public static InetAddress get Localhost()(d) Public getByName()This question was posed to me in a job interview.This interesting question is from Socket Programming in chapter Networking of Computer Network |
|
Answer» Correct OPTION is (a) Public STRING get Hostname() |
|
| 43. |
The flush () method of Print Stream class flushes any un-cleared buffers in the memory.(a) True(b) FalseThe question was posed to me in homework.This key question is from Socket Programming topic in section Networking of Computer Network |
|
Answer» The correct option is (a) True |
|
| 44. |
What does the java.net.InetAddress class represent?(a) Socket(b) IP Address(c) Protocol(d) MAC AddressI got this question by my school teacher while I was bunking the class.This interesting question is from Socket Programming in section Networking of Computer Network |
|
Answer» Correct OPTION is (B) IP Address |
|
| 45. |
TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________(a) Socket(b) IP Address(c) Protocol(d) MAC AddressI had been asked this question by my school principal while I was bunking the class.The query is from Socket Programming topic in section Networking of Computer Network |
|
Answer» The CORRECT choice is (c) PROTOCOL |
|
| 46. |
Datagram is basically just a piece of information but there is no guarantee of its content, arrival or arrival time.(a) True(b) FalseThis question was addressed to me in an international level competition.The query is from Socket Programming in section Networking of Computer Network |
|
Answer» Correct answer is (a) True |
|
| 47. |
The URL Connection class can be used to read and write data to the specified resource that is referred by the URL.(a) True(b) FalseI had been asked this question in semester exam.This interesting question is from Socket Programming topic in chapter Networking of Computer Network |
|
Answer» The correct ANSWER is (a) True |
|
| 48. |
The client in socket programming must know which information?(a) IP address of Server(b) Port number(c) Both IP address of Server & Port number(d) Only its own IP addressI got this question by my school principal while I was bunking the class.My question is from Socket Programming topic in section Networking of Computer Network |
|
Answer» Correct ANSWER is (c) Both IP ADDRESS of SERVER & Port number |
|
| 49. |
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?(a) Datagram Socket(int port)(b) Datagram Socket(int port, Int Address address)(c) Datagram Socket()(d) Datagram Socket(int address)The question was posed to me in homework.Query is from Socket Programming in portion Networking of Computer Network |
|
Answer» CORRECT option is (b) Datagram Socket(int PORT, Int Address address) To explain I would say: Datagram Socket (int port, Int Address address) is USED to create a datagram socket. A datagram socket is created for connection-less communication between the server and the client. There is no accept() METHOD in this class. |
|
| 50. |
Which methods are commonly used in Server Socket class?(a) Public Output Stream get Output Stream ()(b) Public Socket accept ()(c) Public synchronized void close ()(d) Public void connect ()I had been asked this question in an international level competition.Enquiry is from Socket Programming topic in section Networking of Computer Network |
|
Answer» Correct option is (b) Public Socket accept () |
|