Networking :: All Aptitude Test ::

1.What port does Telnet use?
A. 22
B. 80
C. 20
D. 22

2.Which of the following will allow footprinting to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. PingSweep

3.Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________?
A. Cracking
B. Analysis
C. Hacktivism
D. Cracking

4.What is the most important activity in system hacking?
A. Information gathering
B. Cracking passwords
C. Escalating privileges
D. Information gathering

5. A packet with no flags set is which type of scan?
A. TCP
B. XMAS
C. IDLE
D. TCP

6.How many messages will HQTTP will send in 1024?
A. 256
B. 514
C. 240
D. 256

7. How many messages will HTTP will send per hour?
A. 1,708
B. 160,278
C. 3,628
D. 1,708

8.What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency

9.A request from client is basically made of ______?
A. Method
B. Task
C. Event
D. Method

10.Response is made up of a ________ status code.?
A. two-digit
B. three-digit
C. five-digit
D. two-digit

11.HTTP allows which response?
A. Multiplexing
B. Serial
C. Coherent
D. Multiplexing

12. Which protocol provides server push?
A. SPI
B. MQTT
C. CoAP
D. SPI

13.WOT reduces ________ of HTTP.
A. Overrun
B. Overhead
C. Overload
D. Overrun

14.How many types of message formats are there in HTTP protocol?
A. 4 types
B. 3 types
C. 2 types
D. 4 types

15. Statue line is present in which message format?
A. Request message
B. Response message
C. Both request and response
D. Request message

16.Request field is present in which message format?
A. Request message
B. Response message
C. Both request and response
D. Request message

17.Does HTTP protocol have _________ handshakes.
A. 2 way
B. 1 way
C. 3 way
D. 2 way

18.Does HTTP has pipelining.
A. True
B. False
C. May be
D. True

19. Hyper Text Transfer Protocol (HTTP) support.?
A. Proxy Domain
B. Proxy Documents
C. Proxy Server
D. Proxy Domain

20.In Hypertext transaction, the formats of the request and response messages are?
A. Different
B. Similar
C. Constant
D. Different

21.The HTTP uses a TCP connection to:
A. Establishment of servers connection
B. Transfer whole database
C. Client server connections
D. Establishment of servers connection

22.An HTTP message is similar in form to an :
A. C+
B. SMTP
C. TCP
D. C+

23.An HTTP message is similar in form to an :
A. C+
B. SMTP
C. TCP
D. C+

24. The Hypertext Markup Language (HTML) is a language for creating..?
A. Networks
B. Webpage
C. Protocols
D. Networks

25.In File Transfer Protocol (FTP), while the control connection is open, the data connection can be opened and closed :
A. One time
B. Several Times
C. Not even Once
D. One time

26. File Transfer Protocol (FTP), uses the same operation used by :
A. ICMP
B. STMP
C. TCP
D. ICMP

27.File Transfer Protocol (FTP), uses the well-known port 21 is used for the control connection and port 20 for the :
A. Data Rate
B. Data Connection
C. Data Protocol
D. Data Rate

28.In File Transfer Protocol (FTP), a user needs an account (user name) and a password on the :
A. Same Server
B. Remote Server
C. Central Server
D. Same Server

29.The well-known port used for FTP's control connection is :
A. Port 6
B. Port 8
C. Port 20
D. Port 6

30.In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.
A. 21; 22
B. 21; 20
C. 20; 21
D. 21; 22


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers