Sunday, 8 November 2020

CS8591 Computer Networks - UNIT V APPLICATION LAYER - Multiple Choice Questions (MCQ)

CS8591 Computer Networks

UNIT V APPLICATION LAYER

(Multiple Choice Questions (MCQ))

WWW and HTTP – FTP – Email –TELNET –SSH – DNS – SNMP.

1. Application layer is at the _________ level of the OSI model.

A. bottom

B. top

C. middle

D. None of the above

Ans. B

2. The TCP/IP ____________ corresponds to the Session, Presentation, and Application layers of the OSI model.

A. application layer

B. presentation layer

C. session layer

D. None of the above

Ans. A

3. The packet of information at the application layer is called __________

A. Packet

B. Message

C. Segment

D. Frame

Ans. B

4. Which of the following is/are the important applications of the application layer?

A. Electronic mail

B. World Wide Web

C. USENET

D. All of the above

Ans. D

5. Which of the following is an application layer service?

A. Network virtual terminal

B. File transfer, access, and management

C. Mail service

D. All of the above

Ans. D

6. Application layer offers _______ service.

A. End to end

B. Process to process

C. Both End to end and Process to process

D. None of the above

Ans. A

7. Which is not a application layer protocol?

A. HTTP

B. SMTP

C. FTP

D. TCP

Ans. D

8. ___________ address is related to application layer.

BA. physical

B. logical

C. port

D. specific

Ans. D

9. Examples of specific addresses are

A. E-mail address

B. Uniform Resource Locator (URL)

C. both (a) and (b)

D. None of the above

Ans. C

10. Two of the most popular traditional applications are:

A .World Wide Web (WWW) and Electronic Mail (E-mail)

B. Domain Name System (DNS) and World Wide Web (WWW)

C.  Electronic Mail (E-mail) and Domain Name System (DNS)

D. None of the above

Ans. A

11. SMTP and HTTP are ____________; Internet Explorer and Chrome are _____________.

A. Application protocols; Application programs

B. Application programs; Application protocols

C. both (a) and (b)

D. None of the above

Ans. A

12. Which of the following is/are not application protocol(s)?

A. Simple Mail Transfer Protocol (SMTP)

B. Hyper Text Transfer Protocol (HTTP)

C. Simple Network Management Protocol (SNMP)

D. User Datagram Protocol (UDP)

Ans. D

13. Which of the following is/are true?

A. The companion protocol specifies the format of data that can be exchanged.

B. SMTP, HTTP and SNMP have a companion protocol.

C. DNS does not have a companion protocl.

D. All of the above

Ans. D

14. The ___________________ is the network of  pages of images, texts and sounds on the  Internet which can be viewed using  browser software .

A. World Wide Web (WWW)

B. HTTP

C. FTP

D. None of the above

Ans. A

15. The ________________ is a repository of information linked together from point all over the world.

A. Hyper Text Transfer Protocol (HTTP)

B. Hyper Text Markup Language (HTML)

C. World Wide Web (WWW)

D. None of the above

Ans. C

16. WWW has a unique combination of

A. flexibility

B. portability

C. user-friendly features

D. All of the above

Ans. D

17. The WWW project was initiated by ______________.

A. European Laboratory for Particle Physics (CERN)

B. IETF

C. IANA

D. None of the above

Ans. A

18. The _____________ today is a distributed client/server service, in which a client using a browser can access a service using a server. However, the service provided is distributed over many locations called sites.

A. World Wide Web (WWW)

B. HTTP

C. FTP

D. None of the above

Ans. A

19. ___________ is a program, which is used to communicate with web server on the Internet.

A. HTTP

B. FTP

C. Web browser

D. None of the above

Ans. C

20. Each browser consists of _________ parts.

A. two

B. three

C. four

D. None of the above

Ans. B

21. Each browser consists of the following.

A. controller

B. client protocol

C` interpreter

D. All of the above

Ans. D 

22. Match the following between column X and column Y

Column X

Column Y

I.   Controller

1. FTP, HTTP, TELNET, SMTP

II.  Client Protocol

2. HTML, Java, JavaScript

III. Interpreter

3. Receives input from input device and use the programs to access the documents.

 

A. I,3; II, 1; III, 2

B. I,2; II,1, III,3

C. I,1; II,3, III,2

D. None of the above

Ans. A

23. The ______________ is a standard for specifying any kind of information on the Internet.

A. World Wide Web (WWW)

B. Hyper Text Transfer Protocol (HTTP)

C. Uniform Resource Locator (URL)

D. Hyper Text Markup Language (HTML)

Ans. C

24. The URL consists of the following parts:

A. protocol, host computer, port and path

B.  protocol, host computer, port

C. host computer, port and path

D. None of the above

Ans. A

25. The URL consists of _________  parts.

A. two

B. three

C. four

D. five

Ans. C

26. In the URL, the __________________ is the client-server program which is used to retrieve the document or file.

A. protocol

B. host

C. port

D. path

Ans. A

27. In the URL, the ________________ is the name of computer on which the information is located.

A. protocol

B. host

C. port

D. path

Ans. B

28. The URL can optionally contain the ________  and it is separated from the host name by a colon.

A. protocol

B. host

C. port number

D. path

Ans. C

29. The documents in the WWW can be grouped into __________ broad categories.

A. two

B. three

C. four

D. five

Ans. B

30. The documents in the WWW can be grouped into the following categories

A. static and dynamic

B. dynamic and active

C. static, dynamic and active

D. None of the above

Ans. C

31. _____________ documents are fixed-content documents that are created and stored in a server. The client can get only a copy of the document.

A. Static

B. Dynamic

C. Active

D. None of the above

Ans. A

32. ___________________ is the language for documents designed to be displayed in a web browser.

A. Hyper Text Markup Language (HTML)

B. File Transfer Protocol (FTP)

C. Hyper Text Transfer Protocol (HTTP)

D. None of the above

Ans. A

33. A ______________ document is created by a Web server whenever a browser requests the document.

A. Static

B. Dynamic

C. Active

D. None of the above

Ans. B

34. The ___________________ is a technology that creates and handles dynamic documents.

A. Graphical User Interface (GUI)

B. Common Gateway Interface (CGI)

C. both (a) and (b)

D. None of the above

Ans. B

35. Dynamic documents are sometimes referred to as ______________ documents.

A. Server-site dynamic

B. Client-site dynamic

C. both (a) and (b)

D. None of the above

Ans. A

36. For many applications, we need a program or a script to be run at the client site. These are called ________ documents.

A. Static

B. Dynamic

C. Active

D. None of the above

Ans. C

37. ______________ is one of the ways to create active documents

A. Java applet

B. CGI

C. GUI

D. None of the above

Ans. A

38. Active documents are sometimes referred to as ______________ documents.

A. Server-site dynamic

B. Client-site dynamic

C. both (a) and (b)

D. None of the above

Ans. B

39. The ____________ is a protocol used mainly to access data on the World Wide Web. It functions as a combination of FTP and SMTP.

A. Domain Name System (DNS) protocol

B. Simple Network Management Protocol (SNMP

C. Hyper Text Transfer Protocol (HTTP)

D. None of the above

Ans. C

40. HTTP uses the services of TCP on well-known port _____.

A. 70

B. 80

C. 60

D. 90

Ans. B

41. HTTP functions as a combination of ______ and _______.

A. FTP; SMTP

B. FTP; SNMP

C. DNS; TFTP

D. None of the above

Ans. A

42. HTTP uses the services of _________.

A. TCP

B. UDP

C. SCTP

D. None of the above

Ans. A

43. A _________ protocol does not require the server to retain session information or status about each communicating partner for the duration of multiple requests.

A. stateful

B. stateless

C. both (a) and (b)

D. None of the above

Ans. B

44. HTTP itself is a _________  protocol.

A. stateful

B. stateless

C. both (a) and (b)

D. None of the above

Ans. B

45. A protocol that requires keeping of the internal state on the server is known as a ________ protocol.

A. stateful

B. stateless

C. both (a) and (b)

D. None of the above

Ans. A

46. FTP and TELNET are ___________ protocols

A. stateful

B. stateless

C. both (a) and (b)

D. None of the above

Ans. A

47. In HTTP transaction, a request message consists of

A. a request line, a header, and sometimes a body.

B. a status line, a header, and sometimes a body.

C. both (a) and (b)

D. None of the above

Ans. A

48. In HTTP transaction, a request message always contains

A. a request line and a header

B. a status line and a header

C. both (a) and (b)

D. None of the above

Ans. A

49. In HTTP transaction, a response message consists of

A. a request line, a header, and sometimes a body.

B. a status line, a header, and sometimes a body.

C. both (a) and (b)

D. None of the above

Ans. B

50. In HTTP transaction, a response message always contains

A. a request line and a header

B. a status line and a header

C. both (a) and (b)

D. None of the above

Ans. B

51. The first line in the request message is ______________; the first line in the response message is _______________.

A. status line; request line

B. request line; status line

C. both (a) and (b)

D. None of the above

Ans. B

52. The most current version of HTTP is _____.

A. 0.9

B. 1.0

C. 1.1

D. None of the above

Ans. C

53. Match the following between the column ‘Method’ and the column ‘Action’.

Method

Action

I.   GET

1. Sends a document from the server to the client

II.  POST

2. Requests a document from the server

III. PUT

3. Sends some information from the client to the server

IV  HEAD

4. Requests information about a document but not the document itself.

 

A. I,1; II,3; III,2, IV, 4

B. I,2; II,3; III,1; IV,4

C. I,3; II,1; III;2; IV,4

D. I,2; II,1; III,3; IV,4

Ans. B

54. In HTTP, the ____________ exchanges additional information between the client and the server.

A. Header

B. Request line

C. Status line

D. None of the above

Ans. A

55. Which of the following is present in both an HTTP request line and a status line?

A. HTTP version number

B. status code

C. URL

D. None of the above

Ans. A

56. A request message can contain only

A. General, Request headers

B. General, Request and Entity headers

C. Request, and Entity headers

D. None of the above

Ans. B

57. A response message can contain only

A. General, Response, and Entity headers.

B. Response and Entity headers.

C. General and Request headers.

D. None of the above

Ans. A

58. In a _____________________ connection, one TCP connection is made for each request/response.

A. persistent

B. nonpersistent

C. both (a) and (b)

D. None of the above

Ans. B

59. In a _________________ connection, the server leaves the connection open for more requests after sending a response.

A. persistent

B. nonpersistent

C. both (a) and (b)

D. None of the above

Ans. A

60. HTTP version 1.1 specifies a _______________ connection by default.

A. persistent

B. nonpersistent

C. both (a) and (b)

D. None of the above

Ans. A

61. HTTP supports ________ servers which are computers that keep copies of responses to recent requests.

A. parallel

B. Proxy

C. additional

D. None of the above

Ans. B

62. FTP stands for ___________________.

A. Fast Transfer Protocol

B. File Transfer Protocol

C. File Transit Protocol

D. None of the above

Ans. B

63. FTP uses the services of _____.

A. UDP

B. TCP

C. SCTP

D. None of the above

Ans. B

64. In FTP, a transaction may be of the following basic types:

A. request, response, transfer

B. request, response, transfer, terminate

C. response, transfer, terminate

D. None of the above

Ans. B

65. FTP establishes two connections between the hosts. One connection is used for __________, the other for ____________.

A. data transfer; control information

B. data transfer; management data

C. both (a) and(b)

D. None of the above

Ans. A

66. FTP uses _____ well-known TCP ports.

A. four

B. three

C. two

D. None of the above

Ans. C

67. The well-known port ___ is used for the control connection and the well-known port ____ for the data connection.

A. 18; 17

B. 19; 18

C. 21; 20

D. 20; 19

Ans. C

68. FTP is built on _____ architecture.

A. Client-server

B. P2P

C. Data centric

D. Service oriented

Ans. A

69. In FTP, _____________ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.

A. minimize delay

B. Maximize throughput

C. minimize error

D. None of the above

Ans. A

70. For the control connection, FTP uses the __________ character set.

A. EBCDIC

B. regular ASCII

C. NVT ASCII

D. None of the above

Ans. C

71. During an FTP session, the control connection is opened __________.

A. exactly twice

B. exactly once

C. as many times as necessary

D. None of the above

Ans. B

72. During an FTP session, the data connection is opend __________.

A. exactly twice

B. exactly once

C. as many times as necessary

D. None of the above

Ans. C

73. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called ____________.

A. data structures

B. file types

C. transmission modes

D. None of the above

Ans. A

74. In FTP, there are three types of __________: stream, block, and compressed

A. data structures

B. file types

C. transmission modes

D. None of the above

Ans. C

75. In FTP, ASCII, EBCDIC, and image define an attribute called _________.

A. data structures

B. file type

C. transmission modes

D. None of the above

Ans. B

76. In FTP, when we _________, it is copied from the server to the client.

A. retrieve a file

B. retrieve a list

C. both (a) and (b)

D. None of the above

Ans. C

77. In FTP, when we _________, it is copied from the client to the server.

A. retrieve a list

B. retrieve a file

C. Store a file

D. None of the above

Ans. C

78. Identify the incorrect statement regarding FTP.

A. FTP stands for File Transfer Protocol

B. FTP uses two parallel TCP connections

C. FTP sends exactly one file over the data connection

D. FTP sends its control information in-band

Ans. D

79. If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is _______

A. 5

B. 6

C. 2

D. 10

Ans. B

80. FTP server _____________

A. maintains state information

B. is stateless

C. has single TCP connection for a file transfer

D. has UDP connection for file transfer

Ans. A

81. The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format.

a) 3

b) 5

c) 7

d) 8

Ans. C

82. Find the FTP reply whose message is wrongly matched.

A. 331 – Username OK, password required

B. 425 – Can’t open data connection

C. 452 – Error writing file

D. 452 – Cannot open data connection

Ans. D

83. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is ________

A. Stream mode

B. Block mode

C. Compressed mode

D. Message mode

Ans. A

84. The password is sent to the server using ________ command

A. PASSWD

B. PASS

C. PASSWORD

D. PWORD

Ans. B

85. The major difference between FTP and HTTP is that FTP is a _______ system (FTP can be used to copy/move files from a server to a client as well as upload/transfer files from a client to a server). HTTP, on the other hand, is strictly ______: "transferring files from the server to a client".

A. three-way; two-way

B. two-way; one-way

C. both (a) and (b)

D. None of the above

Ans. B

86. Which of the following is/are true about Trivial File Transfer Protocol (TFTP)?

A. TFTP is frequently used to allow diskless hosts to boot over the network.

B. TFTP is implemented by the TFTP client program and by the TFTP server program.

C. TFTP works on 69 Port number.

D. All of the above

Ans. D

87. _______ is a complete, session-oriented, general purpose file transfer protocol, and it can be used interactively. _______ is used as a bare-bones special purpose file transfer protocol, and it allows only unidirectional transfer of files.

A. FTP; SCTP

B. FTP; TFTP

C. SNMP; TFTP

D. None of the above

Ans. B

88. ___________ are self-contained, modular, distributed, dynamic applications that can be described, published, located or invoked over the network to create products, processes, and supply chains.

A. Web services

B. internet services

C. both (a) and (b)

D. None of the above

Ans. A

89. Which of the following is/are true about web services?

A. Web services are web application components.

B. Web services can be published, found and used on the web.

C. Web services are built on top of open standards such as TCP/IP, HTTP, Java, HTML, and XML.

D. All of the above

90. Web services are of two types. They are:

A. User centric and Application centric

B. Active and Static

C. both (a) and (b)

D. None of the above

Ans. A

91. Web services make full use of the following open standards

A. HTTP and Extensible Markup Language (XML),

B. Simple Object Access Protocol (SOAP), and Web Services Description Language (WSDL), and

C. Universal Description Discovery and Integration (UDDI).

D. All of the above

92. Benefits of using Web Services are:

A. Exposing the existing function onto network

B. Connecting different applications (interoperability)

C. Standardized Protocol and Low cost of communication

D. All of the above

Ans. D

93. The first component of an electronic mail system is ___________________

A. User Agent (UA)

B. Manager

C. both (a) and (b)

D. None of the above

Ans. A

94. ________________ provides service to the user to make the process of sending and receiving a message easier.

A. An MTA

B. An MAA

C. A UA

D. None of the above

Ans. C

95. A _________ is a software package (program) that composes, reads, replies to and forward messages. It also handle mailboxes.

A. User Agent (UA)

B. Manager

C. both (a) and (b)

D. None of the above

Ans. A

96. Services of a user agent are:

A. Composing messages

B. Reading messages & Replying to messages

C. Forwarding messages & Handling mailboxes

D. All of the above

Ans. D

97. Two types of user agents:

A. Command-driven and Graphical User Interface-based (GUI-based)

B. Command-driven and CGI

C. both (a) and (b)

D. None of the above

Ans. A

98. A _________ user agent accepts a one-character command from the keyboard to perform its task.

A. Command-driven

B. GUI-based

C. both (a) and (b)

D. None of the above

Ans. A

99. Examples of command-driven user agents are

A. mail

B. pine

C. elm

D. All of the above

Ans. D

100. ___________ contain Graphical User Interface (GUI) components to interact with the software by using the keyboard and the mouse. They have graphical components such as icons, menu bars, and windows that make the services easy to access.

A. Command-driven

B. GUI-based

C. both (a) and (b)

D. None of the above

Ans. B

101. Examples of GUI-based user agents are

A. Eudora

B. Microsoft Outlook

C. Netscape.

D. All of the above

Ans. D

102. Email address consists of two parts: a _______ and a _______, separated by an ___ sign.

A. local part; domain name; @

B. local part; domain name; #

C. remote part; domain name; @

D. None of the above

Ans. A

103. ____________________ is an Internet protocol used to send audio, video, programs, graphics and other binary files.

A. RFC 822

B. Multipurpose Internet Mail Extensions (MIME)

C. both (a) and (b)

D. None of the above

Ans. B

104. __________ specifies how to convert the non-ASCII data into ASCII allowing it to remain compatible with existing email protocols.

A. RFC 822

B. Multipurpose Internet Mail Extensions (MIME)

C. both (a) and (b)

D. None of the above

Ans. B

105. MIME defines _____ additional email header fields.

A. 3 B. 4 C. 5 D. 6

Ans. C

106. Email header fields are:

A. MIME-Version

B. Content-Type, and Content-Transfer-Encoding

C. Content-ID, and Content-Description

D. All of the above

Ans. D

107. When the sender and the receiver of an email are on the same system, we need only ________.

A. one UA

B. two UAs

C. 3 UAs

D. None of the above

Ans. B

108. When the sender and the receiver of an email are on different systems, we need only ________.

A. one UA

B. two UAs

C. two UAs and one pair of MTAs (client and server)

D. None of the above

Ans. C

109. When the sender is connected to the mail server via a LAN or a WAN, we need ___________.

A. two MTA

B. two UAs and two pairs of MTAs (client and server)

C. two UAs and one pair of MTAs

D. None of the above

Ans. B

110. When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ______________________.

A. two UAs, two pairs of MTAs, and a pair of MAAs

B. two UAs, and two pairs of MTAs

C. two UAs, two pairs of MTAs, and two pairs of MAAs

D. None of the above

Ans. A

111. The actual mail transfer requires

A. UAs

B. Message Transfer Agents (MTAs)

C. both (a) and (b)

D. None of the above

Ans. B

112. The protocol that defines the MTA client and server in the Internet is called ________________________.

A. Simple Network Management Protocol (SNMP)

B. Simple Mail Transfer Protocol (SMTP)

C. Post Office Protocol (POP)

D. None of the above

Ans. B

113. SMTP is a _____________ protocol.

A. push

B. pull

C. both (a) and (b)

D. None of the above

Ans. A

114. _______ SMTP commands are used.

A. 11

B. 12

C. 13

D. 14

Ans. D

115. The process of transferring a mail message occurs in __________ phases.

A. two

B. three

C. four

D. five

Ans. B

116. The process of transferring a mail message occurs in the following phases.

A. Connection establishment, Mail transfer, and Connection termination

B. Connection establishment and Connection termination

C. Mail transfer

D. None of the above

Ans. A

117. Currently two message access protocols are available: __________________ and _________________.

A. Post Office Protocol (POP) version 3; Internet Message Access Protocol (IMAP4).

B. Post Office Protocol (POP) version 3; Internet Group Management Protocol (IGMP)

C. both (a) and (b)

D. None of the above

Ans. A

118. Which of the following is/are true of POP3?

A. POP3 is simple and limited functionality & POP3 client is needed on user machine and POP3 server on the mail server machine.

B. The client opens a connection to the server on TCP port 110.

C. It then sends its user name and password to access the mailbox. User can then access the email.

D. All of the above

Ans. D

119. _______________ is more powerful and more complex than POP3.

A. Internet Message Access Protocol (IMAP)

B. Internet Group Management Protocol (IGMP)

C. SMTP

D. None of the above

Ans. A

120. Which of the following can be doing by a user with use of IMAP?

A. A user can check the email header prior to downloading.

B. A user can search the contents of the email for a specific string of characters prior to downloading  & a user can partially download email

C. A user can create, delete, or rename mailboxes on the mail server; a user can create a hierarchy of mailboxes in a folder for email storage.

D. All of the above

Ans. D

121. In the Web-based mail, mail transfer and retrieval requires

A. MTA

B. MAA

C. the use of HTTP

D. None of the above

Ans. C

122. TELNET is an abbreviation for __________________.

A. telecommunication network

B. telephone network

C. terminal network

D. None of the above

Ans. C

123. _______ allows you to connect and login to a remote computer

A. FTP

B. TELNET

C. HTTP

D. SMTP

Ans. B

124. TELNET is used for ____________.

A. remote login

B. television on net

C. both (a) and (b)

D. None of the above

Ans. A

125. TELNET is a ____________ Client/server application program.

A. general-purpose

B. specific-purpose

C. both (a) and (b)

D. None of the above

Ans. A

126. TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.

A. a well-known; a registered

B. a well-known; an ephemeral

C. an ephemeral; a well-known

D. a registered; an ephemeral

Ans. B

127. The _________________ is software residing on the remote system that allows the remote system to receive characters from a TELNET server.

A. pseudoterminal driver

B. terminal driver

C. both (a) and (b)

D. None of the above

Ans. A

128. The ___________ translates local characters into NVT form.

A. TELNET server

B. TELNET client

C. terminal driver

D. None of the above

Ans. B

129. The ___________ translates NVT characters into a form acceptable by the remote operating system.

A. TELNET server

B. TELNET client

C. terminal driver

D. None of the above

Ans. A

130. Which of the following statements is correct for “character at a time” mode?

A. Most text typed is immediately sent to the remote host for processing

B. Character processing is done on the local system under the control of the remote system

C. All text is echoed locally, only completed lines are sent to the remote host

D. All text is processed locally, and only confirmed lines are sent to the remote host

Ans. A

131. What is the correct syntax to be written in the web browser to initiate a TELNET connection to www.xyz.com?

A. TELNET//www.xyz.com

B. TELNET:www.xyz.com

C. TELNET www.xyz.com

D. TELNET://www.xyz.com

Ans. D

132. Which one of the following is not correct?

A. TELNET is a general purpose client-server program.

B. TELNET lets user access an application on a remote computer.

C. TELNET can be used for remote login.

D. TELNET can also be used for file transfer.

Ans. D

133. TELNET operates in three modes: _____________, ____________ and ______________.

A. default mode; character mode; line mode

B. default mode; character mode; transmission mode

C. character mode; line mode; transmission mode

D. None of the above

Ans. A

134. Which operating mode of TELNET is full duplex?

A. default mode

B. server mode

C. character mode

D. line mode

Ans. D

135. If we want that a character be interpreted by the client instead of server _________

A. control functions has to be disabled

B. it is not possible

C. cli character has to be used

D. interpret as command (IAC) escape character has to be used

Ans. D

136. If the sender wants to disable an option, it sends a __________ command.

A. WILL

B. WONT

C. DO

D. DONT

Ans. B

137. If the sender wants to enable an option, it sends a __________ command.

A. WILL

B. WONT

C. DO

D. DONT

Ans. A

138. If the sender wants an option disabled by the receiver, it sends a __________ command.

A. WILL

B. WONT

C. DO

D. DONT

Ans. D

139. Secure Shell (SSH) network protocolis used for ____________.

A. secure data communication

B. remote command-line login

C. remote command execution

D. All of the above

Ans. D

140. SSH can be used in only _____________.

A. Unix-like operating systems

B. Windows

C. both (a) and (b)

D. None of the above

Ans. C

141. SSH uses ___________ to authenticate the remote computer.

A. private-key cryptography

B. public-key cryptography

C. either (a) or (b)

D. None of the above

Ans. B

142. Which standard TCP port is assigned for contacting SSH servers?

A. port 20

B. port 21

C. port 22

D. port 23

Ans. C

143. Which one of the following protocol can be used for login to a shell on a remote host except SSH?

A. TELNET

B.  rlogin

C. both TELNET and rlogin

D. None of the mentioned

Answer: C

144. Which one of the following is a file transfer protocol using SSH?

A. SFTP

B. SCP

C. Rsync

d) All of the above

Ans: D

145. SSH-2 does not contain ______________

A. transport layer

B.  user authentication layer

C.  connection layer

D.  physical layer

Answer: D

146. Which one of the following feature was present in SSH protocol, version 1?

A. password changing

B. periodic replacement of session keys

C. support for public-key certificates

D. None of the above

Ans: D

147. Which one of the following feature was present in SSH-2  protocol, version 2?

A. password changing

B. periodic replacement of session keys

C. support for public-key certificates

D. All of the above

Ans: D

148. SCP protocol is evolved from __________ over SSH.

A. DHCP protocol

B. MGCP protocol

C. GCP protocol

D. Rate Control Protocol (RCP)

Answer: D

149. Which one of the following authentication method is used by SSH?

A. host-based

B. public-key

C. password

D. All of the above

Ans. D

150. Which of the following is/are true about DNS?

A. DNS protocol runs over UDP and uses port 53.

B. DNS is specified in RFC 1034 and RFC 1035.

C. DNS is the application layer protocol.

D. All of the above

Ans. D

151. Domain Name System (DNS) is responsible for ____________________.

A. DNS converts domain names (of the form www.xyz.com) into IP numbers

B. DNS is routing the packets.

C. both (a) and (b)

D. None of the above

Ans. A

152. If a label is terminated by a null string, it is called a _______________________________ which is a domain name that contains the full name of a host.

A. Fully Qualified Domain Name (FQDN)

B. Partially Qualified Domain Name (PQDN)

C. Both (a) and (b)

D. None of the above

Ans. A

153. Which of the following service(s) is/are provided by DNS?

A. Host aliasing

B. Mail server aliasing

C. Load distribution

D. All of the above

Ans. D

154. If a label is not terminated by a null string, it is called a _____________________________.

A. Fully Qualified Domain Name (FQDN)

B. Partially Qualified Domain Name (PQDN)

C. Both (a) and (b)

D. None of the above

Ans. B

155. A ______________ is a subtree of the domain name space.

A. zone

B. label

C. domain

D. None of the above

Ans. C

156. Which of the following is/are true about zone?

A. In  a zone, server has both responsibility and authority.

B. Domain and zone refers to the same thing, if a server accepts responsibility for a domain and does not divide the domain into smaller domains.

C. If a server divides its domain into subdomains and delegates part of its authority to other servers, domain and zone refer to different things.

D. All of the above

Ans. D

157. In the Internet, the DNS (tree) is divided into ________ different sections.

A. two

B. three

C. four

D. five

Ans. B

158. Three sections of DNs in the internet are

A. Generic domains, Country domains and Inverse domains

B. Generic domains, Country domains and subdomains

C. Generic domains, Country domains and zone

D. None of the above

Ans. A

159. The __________ define registered hosts according to their generic behavior. Each node in the tree defines a domain, which is an index to the domain name space database.

A. Generic domains

B. country domains

C. inverse domains

D. None of the above

Ans. A

160. The _______________ section uses two-character country abbreviations. Second labels can be organizational, or they can be more specific, national designations.

A. Generic domains

B. country domains

C. inverse domains

D. None of the above

Ans. B

161. The ___________ is used to map an address to a name.

A. Generic domains

B. country domains

C. inverse domains

D. None of the above

Ans. C

162. A name space that maps each address to a unique name can be organized in the following ways:

A. Flat Name Space

B. Hierarchical Name Space

C. both (a) and (b)

D. None of the above

Ans. C

163. Which of the following is/are true about Flat name space?

A. In a flat name space, a name is assigned to an address.

B. A name in this space is a sequence of characters without structure.

C. The main disadvantage of a flat name space is that it cannot be used in a large system such as the Internet because it must be centrally controlled to avoid ambiguity and duplication.

D. All of the above

164. Which of the following is/are true about Hierarchical name space?

A. In a hierarchical name space, each name is made of several parts.

B. The first part can define the nature of the organization, the second part can define the name of an organization, and the third part can define departments in the organization, and so on.

C. The organization can add suffixes (or prefixes) to the name to define its host or resources.

D. All of the above

Ans. D

165. In DNS, the names are defined in an inverted-tree structure with the root at the top.

The tree can have only ______ levels; level 0 (root) to level _______.

A. 128, 127

B. 127, 126

C. 126, 125

D. 125, 124

Ans. A

166. Each node in the tree has a label, which is a string with a maximum of _____ characters.

The root label is a ____ string.

A. 62, null

B. 63, null

C. 62, null

D. 64, null

Ans. B

167. If a zone consists of the full tree, then that zone server is called ___________  which  do not maintain any information about domains.

A. root server

B. primary server

C. secondary server

D. None of the above

Ans. A

168. A _________________ is a server that stores a file about the zone for which it is an authority. It is responsible for creating, maintaining, and updating the zone file. It stores the zone file on a local disk.

A. root server

B. primary server

C. secondary server

D. None of the above

Ans. B

169. A _______________ is a server that transfers the complete information about a zone from another server (primary or secondary) and stores the file on its local disk.It neither creates nor updates the zone files. If updating is required, it must be done by the primary server, which sends the updated version to the secondary.

A. root server

B. primary server

C. secondary server

D. None of the above

Ans. C

170. __________________________ is a framework for managing devices in an internet using the TCP/IP protocol suite.

It provides a set of fundamental operations for monitoring and maintaining an internet.

A. Simple Mail Transfer Protocol (SMTP)

B. Simple Network Management Protocol (SNMP)

C. File Transfer Protocol (FTP)

D. None of the above

Ans. B

171. Which of the following is/are true about SNMP?

A. SNMP uses the concept of manager and agent.

B. A manager (host) is used to control and monitor a set of agents (routers).

C. SNMP is an application-level protocol in which a few manager stations control a set of agents.

D. All of the above

Ans. D

172. SNMP defines the ________________ to be sent from a manager to an agent and vice versa.

A. number of packets received

B. number of packets forwarded

C. format of the packets

D. encoding of the packets

Ans. C

173. A management station, called a manager, is a host that runs the SNMP __________ program.

A. server

B. client

C. both (a) and (b)

D. None of the above

Ans. B

174. A managed station, called an agent, is a router (or a host) that runs the SNMP _______ program.

A. server

B. client

C. both (a) and (b)

D. None of the above

Ans. A

175. Which of the following is/are basis for Management with SNMP?

A. A manager checks an agent by requesting information that reflect the behavior of the agent.

B. A manager forces an agent to perform a task by resetting values in the agent database.

C. An agent contributes to the management process by warning the manager of an unusual situation.

D. All of the above

Ans. D

176. To do management tasks, SNMP uses two other protocols: ________________ and ___________________.

A. Structure of Management Information (SMI); Management Information Base (MIB)

B. Structure of Management Information (SMI); Trivial File Transfer Protocol (TFTP)

c. Trivial File Transfer Protocol (TFTP); Remote Procedure Call (RPC)

D. None of the above

Ans. A

177. ___________ defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values.

A. SMI

B. MIB

C. both (a) and (b)

D. None of the above

Ans. A

178. _______ creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.

A. SMI

B. MIB

C. both (a) and (b)

D. None of the above

Ans. B

179. Functions of SMIv2 are:

A. To name objects

B. To define the type of data that can be stored in an object.

C. To show how to encode data for transmission over the network.

D. All of the above

Ans. D

180. SMI emphasizes three attributes to handle an object: _______, _____, and ________.

A. name; data type; encoding method

B. name; data type; size

C. name; size; encoding method

D. None of the above

Ans. A

181. SMI has two broad categories of data type:_______ and _________.

A. Simple; complex

B. Simple; Structured

C. both (a) and (b)

D. None of the above

Ans. B

182. The __________ data types are atomic data types.

A. structure

B. simple

C. both (a) and (b)

D. None of the above

Ans. B

183. SMI defines two structured data types: ________ and _______.

A. sequence; order

B. sequence and sequence of

C. complex; sequence

D. None of the above

Ans. B

184. SMI uses ____________ to encode data to be transmitted over the network.

A. Basic Encoding Rules (BER)

B. MIB

C. both (a) and (b)

D. None of the above

Ans. A

185. The objects in MIB2 are categorized under _____ different groups.

A. 9

B. 10

C. 11

D. 12

Ans. B

186. SNMP is an application program that allows the following.

A. A manager to retrieve the value of an object defined in an agent.

B. A manager to store a value in an object defined in an agent.

C. An agent to send an alarm message about an abnormal situation to the manager.

D. All of the above

Ans. D

187. SNMPv3 defines ________ types of packets (or PDUs).

A. 7

B. 8

C. 9

D. 10

Ans. B

188. SNMP PDU has fields: PDU type, Request ID, __________,  __________ and __________.

A. Error status

B. Error index

C. VarBind list

D. All of the above

Ans. D

189. SNMP does not send only a PDU; it embeds the PDU in a ___________.

A. packet

B. message

C. segment

D. None of the above

Ans. B

190. A message in ________ is made of four elements: Version, Header, Security parameters and Data.

A. SNMPv3

B. SMTP

C. TFTP

D. None of the above

Ans. A

191. SNMP uses the services of _____.

A. TCP

B. UDP

C. both (a) and (b)

D. None of the above

Ans. B

192. The well-known port _____ is used by the server (agent) whereas the well-known port _____ is used by the client (manager).

A. 162;163

B. 161;162

C. 163;164

D. 160;161

Ans. B

193. The GetRequest PDU is sent from the _________ to the __________  retrieve the value of a variable or a set of variables.

A. client; server

B. server; client

C. client; network

D. None of the abve

Ans. A

194. The response PDU is sent from the _________ to the ________ to report an event.

A. client; server

B. server; client

C. client; network

D. None of the abve

Ans. B

195. INTEGER, OCTET STRING, and ObjectIdentifier are ___________ definitions used by SMI.

A. ASN.1

B. MIB

C. SNMP

D. None of the above

Ans. A

196. Which of the following could be a legitimate MIB object identifier?

A. 1.3.6.1.2.1.1

B. 1.3.6.1.2.2.1

C. 2.3.6.1.2.1.2

D. 3.3.6.1.2.1.2

Ans. A

197. Which is a manager duty?

A. Retrieve the value of an object defined in an agent

B. Store the value of an object defiend in an agent

C. both (a) and (b)

D. None of the above

Ans.D

198. For a 1-byte length field, what is the maximum value for the data length?

A. 127

B. 128

C. 255

D. None of the above

Ans.127

199. An object id defines a _________. Add a zero suffix to define the ________.

A. variable; table

B. table; variable

C. variable; variable contents

D. None of the above

Ans. C

200. An SNMP agent can send ________ messages.

A. GetRequest

B. SetRequest

C. Trap

D. None of the above

Ans. C

201. An SNMP agent can send __________ messages.

A. Response

B. GetRequest

C. SetRequest

D. None of the above

Ans. A

202. The __________ field in the SNMP PDU is an offset that points to the variable in error.

A. community

B. enterprise

C. error index

D. None of the above

Ans. C


Dr. Selvaganesan
Dept of IT, JJCET

 

                                                                                                                                       

No comments:

Post a Comment