A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

291. A network topology that combines features of linear bus and star topology:
a. Mesh
b. Ring
c. Tree
d. Cube
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).Tree

292. The science and art of breaking ciphers
a. Cryptography
b. Steganography
c. Cryptanalysis
d. Steganalysis
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).Cryptanalysis

293. Process of mapping a network interface IP address to its hardware address:
a. ARP
b. RARP
c. ICMP
d. IGMP
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).ARP

294. The local area network technology used in Ethernet
a. CSMA
b. CSMA/CD
c. CSMA/CA
d. ALOHA
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).CSMA/CD

295. Match the following Secret Key Algorithms (List I) with Corresponding Key Lengths (List II) and choose the correct answer from the code given below:

List I List II
(a) Blowfish (i) 128 – 256 bits
(b) DES (ii) 128 bits
(c) IDEA (iii) 1 - 448 bits
(d) RC5 (iv) 56 bits
a. (a)–(iv), (b)-(iii), (c)-(ii) , d-(i)
b. (a)–(iii), (b)-(iv), (c)-(i) , d-(ii)
c. (a)–(iii), (b)-(iv), (c)-(ii) , d-(i)
d. (a)–(ii), (b)-(iii), (c)-(iv) , d-(i)
View Answer Report Discuss Too Difficult!
Answer: (c).(a)–(iii), (b)-(iv), (c)-(ii) , d-(i)

296. The four byte IP address consists of
a. Network Address
b. Host Address
c. Both Network and Host Addresses
d. Neither Network nor Host Addresses
View Answer Report Discuss Too Difficult!
Answer: (c).Both Network and Host Addresses

297. Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token management and .................. as services.
a. Synchronization
b. Asynchronization
c. Flow control
d. Errors
View Answer Report Discuss Too Difficult!
Answer: (a).Synchronization

298. Which of the following statement/s is/are true?

(i) Firewalls can screen traffic going into or out of an organization.
(ii) Virtual private networks can stimulate an old leased network to provide certain desirable properties.

Choose the correct answer from the code given below:
a. (i) only
b. (ii) only
c. Both (i) and (ii)
d. Neither (i) nor (ii)
View Answer Report Discuss Too Difficult!
Answer: (c).Both (i) and (ii)

299. A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is
a. the Internet
b. the university network
c. the department network
d. the subnet to which the host belongs
View Answer Report Discuss Too Difficult!
Answer: (a).the Internet

300. An Internet Service Provider (ISP) has following chunk of CIDR-based IP addresses available with it :245.248.128.9./20. The ISP wants to give half of this chunk of addresses to organization A and a quarter to organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
a. 245.248.136.0/21 and 245.248.128.0/22
b. 245.248.128.0/21 and 245.248.128.0/22
c. 245.248.132.0/22 and 245.248.132.0/21
d. 245.248.136.0/24 and 245.248.132.0/21
View Answer Report Discuss Too Difficult!
Answer: (a).245.248.136.0/21 and 245.248.128.0/22