Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

Computer Science Engineering (CSE)

In the course of conducting forensic analysis, which of the following actions are carried out?

Question:

In the course of conducting forensic analysis, which of the following actions are carried out?

A.

critical thinking

B.

fusion

C.

validation

D.

all of the above

Answer» d. all of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India

In the course of conducting forensic analysis, which of the following actions are carried out? Read More »

» Information Cyber Security (ICS) solved MCQs

Which one of the following is a cryptographic protocol used to secure HTTP connection?

Question:

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A.

stream control transmission protocol (sctp)

B.

transport layer security (tsl)

C.

explicit congestion notification (ecn)

D.

resource reservation protocol

Answer» b. transport layer security (tsl)

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which one of the following is a cryptographic protocol used to secure HTTP connection? Read More »

» Computer Networks solved MCQs

Which of the following are supervised learning applications

Question:

Which of the following are supervised learning applications

A.

spam detection, pattern detection, natural language processing

B.

image classification, real-time visual tracking

C.

autonomous car driving, logistic optimization

D.

bioinformatics, speech recognition

Answer» a. spam detection, pattern detection, natural language processing

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following are supervised learning applications Read More »

» Machine Learning (ML) solved MCQs

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

Question:

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

A.

8

B.

7

C.

3

D.

5

Answer» b. 7

Note: The above multiple-choice question is for all general and Competitive Exams in India

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format Read More »

» Computer Networks solved MCQs

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

Question:

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

A.

vulnerability attack

B.

bandwidth flooding

C.

connection flooding

D.

all of the mentioned

Answer» c. connection flooding

Note: The above multiple-choice question is for all general and Competitive Exams in India

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host Read More »

» Computer Networks solved MCQs

ISO – 14001 gives stress on ___________

Question:

ISO – 14001 gives stress on ___________

A.

plan – do-check -act

B.

environmental protection

C.

prevention rather than detection

D.

all of the above

Answer» d. all of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India

ISO – 14001 gives stress on ___________ Read More »

» Software Testing and Quality Assurance (STQA) solved MCQs

HTTP client requests by establishing a __________ connection to a particular port on the server.

Question:

HTTP client requests by establishing a __________ connection to a particular port on the server.

A.

user datagram protocol

B.

transmission control protocol

C.

broader gateway protocol

D.

none of the mentioned

Answer» b. transmission control protocol

Note: The above multiple-choice question is for all general and Competitive Exams in India

HTTP client requests by establishing a __________ connection to a particular port on the server. Read More »

» Computer Networks solved MCQs

A point-to-point protocol over ethernet is a network protocol for

Question:

A point-to-point protocol over ethernet is a network protocol for

A.

encapsulating ppp frames inside ethernet frames

B.

encapsulating ehternet framse inside ppp frames

C.

for security of ethernet frames

D.

for security of ppp frames

Answer» a. encapsulating ppp frames inside ethernet frames

Note: The above multiple-choice question is for all general and Competitive Exams in India

A point-to-point protocol over ethernet is a network protocol for Read More »

» Computer Networks solved MCQs