CS8591 Computer
Networks
UNIT V APPLICATION LAYER
(Multiple Choice Questions (MCQ))
WWW and HTTP – FTP – Email –TELNET –SSH – DNS – SNMP.
1.
Application layer is at the _________ level of the OSI model.
A.
bottom
B.
top
C.
middle
D.
None of the above
Ans.
B
2. The TCP/IP ____________
corresponds to the Session, Presentation, and Application layers of the OSI
model.
A.
application layer
B.
presentation layer
C.
session layer
D.
None of the above
Ans.
A
3. The packet of information at
the application layer is called __________
A.
Packet
B.
Message
C.
Segment
D.
Frame
Ans.
B
4. Which of the following is/are
the important applications of the application layer?
A.
Electronic mail
B.
World Wide Web
C.
USENET
D.
All of the above
Ans.
D
5. Which of the following is an application
layer service?
A.
Network virtual terminal
B.
File transfer, access, and management
C.
Mail service
D.
All of the above
Ans.
D
6. Application layer offers
_______ service.
A.
End to end
B.
Process to process
C.
Both End to end and Process to process
D.
None of the above
Ans.
A
7. Which is not a application
layer protocol?
A.
HTTP
B.
SMTP
C.
FTP
D.
TCP
Ans.
D
8. ___________ address is related
to application layer.
BA.
physical
B.
logical
C.
port
D.
specific
Ans.
D
9. Examples of specific addresses
are
A.
E-mail address
B.
Uniform Resource Locator (URL)
C.
both (a) and (b)
D.
None of the above
Ans.
C
10.
Two of the most popular traditional applications are:
A
.World Wide Web (WWW) and Electronic Mail (E-mail)
B.
Domain Name System (DNS) and World Wide Web (WWW)
C.
Electronic Mail (E-mail) and Domain Name
System (DNS)
D.
None of the above
Ans.
A
11.
SMTP and HTTP are ____________; Internet Explorer and Chrome are _____________.
A.
Application protocols; Application programs
B.
Application programs; Application protocols
C.
both (a) and (b)
D.
None of the above
Ans.
A
12.
Which of the following is/are not application protocol(s)?
A.
Simple Mail Transfer Protocol (SMTP)
B.
Hyper Text Transfer Protocol (HTTP)
C.
Simple Network Management Protocol (SNMP)
D.
User Datagram Protocol (UDP)
Ans.
D
13.
Which of the following is/are true?
A.
The companion protocol specifies the format of data that can be exchanged.
B.
SMTP, HTTP and SNMP have a companion protocol.
C.
DNS does not have a companion protocl.
D.
All of the above
Ans.
D
14. The
___________________ is the network of
pages of images, texts and sounds on the
Internet which can be viewed using
browser software .
A.
World Wide Web (WWW)
B.
HTTP
C.
FTP
D.
None of the above
Ans.
A
15. The ________________ is a
repository of information linked together from point all over the world.
A.
Hyper Text Transfer Protocol (HTTP)
B.
Hyper Text Markup Language (HTML)
C.
World Wide Web (WWW)
D.
None of the above
Ans.
C
16. WWW has a unique combination of
A.
flexibility
B.
portability
C.
user-friendly features
D.
All of the above
Ans.
D
17. The WWW project was initiated
by ______________.
A.
European Laboratory for Particle Physics (CERN)
B.
IETF
C.
IANA
D.
None of the above
Ans.
A
18. The _____________ today is a
distributed client/server service, in which a client using a browser can access
a service using a server. However, the service provided is distributed over
many locations called sites.
A.
World Wide Web (WWW)
B.
HTTP
C.
FTP
D.
None of the above
Ans.
A
19. ___________ is a program,
which is used to communicate with web server on the Internet.
A.
HTTP
B.
FTP
C.
Web browser
D.
None of the above
Ans.
C
20. Each browser consists of
_________ parts.
A.
two
B.
three
C.
four
D.
None of the above
Ans.
B
21. Each browser consists of the
following.
A.
controller
B.
client protocol
C`
interpreter
D.
All of the above
Ans.
D
22.
Match the following between column X and column Y
|
Column
X |
Column
Y |
|
I. Controller |
1.
FTP, HTTP, TELNET, SMTP |
|
II. Client Protocol |
2.
HTML, Java, JavaScript |
|
III.
Interpreter |
3.
Receives input from input device and use the programs to access the
documents. |
A.
I,3; II, 1; III, 2
B.
I,2; II,1, III,3
C.
I,1; II,3, III,2
D.
None of the above
Ans.
A
23.
The ______________ is a standard for specifying any kind of information on the
Internet.
A.
World Wide Web (WWW)
B.
Hyper Text Transfer Protocol (HTTP)
C.
Uniform Resource Locator (URL)
D.
Hyper Text Markup Language (HTML)
Ans.
C
24.
The URL consists of the following parts:
A.
protocol, host computer, port and path
B. protocol, host computer, port
C.
host computer, port and path
D.
None of the above
Ans.
A
25.
The URL consists of _________ parts.
A.
two
B.
three
C.
four
D.
five
Ans.
C
26.
In the URL, the __________________ is the client-server program which is used
to retrieve the document or file.
A.
protocol
B.
host
C.
port
D.
path
Ans.
A
27.
In the URL, the ________________ is the name of computer on which the
information is located.
A.
protocol
B.
host
C.
port
D.
path
Ans.
B
28.
The URL can optionally contain the ________ and it is separated from
the host name by a colon.
A.
protocol
B.
host
C.
port number
D.
path
Ans.
C
29.
The documents in the WWW can be grouped into __________ broad categories.
A.
two
B.
three
C.
four
D.
five
Ans.
B
30.
The documents in the WWW can be grouped into the following categories
A.
static and dynamic
B.
dynamic and active
C.
static, dynamic and active
D.
None of the above
Ans.
C
31.
_____________ documents are fixed-content documents that are created and stored
in a server. The client can get only a copy of the document.
A.
Static
B.
Dynamic
C.
Active
D.
None of the above
Ans.
A
32.
___________________ is the language for documents designed to be displayed in a
web browser.
A.
Hyper Text Markup Language (HTML)
B.
File Transfer Protocol (FTP)
C.
Hyper Text Transfer Protocol (HTTP)
D.
None of the above
Ans.
A
33.
A ______________ document is created by a Web server whenever a browser
requests the document.
A.
Static
B.
Dynamic
C.
Active
D.
None of the above
Ans.
B
34.
The ___________________ is a technology that creates and handles dynamic
documents.
A.
Graphical User Interface (GUI)
B.
Common Gateway Interface (CGI)
C.
both (a) and (b)
D.
None of the above
Ans.
B
35.
Dynamic documents are sometimes referred to as ______________ documents.
A.
Server-site dynamic
B.
Client-site dynamic
C.
both (a) and (b)
D.
None of the above
Ans.
A
36.
For many applications, we need a program or a script to be run at the client
site. These are called ________ documents.
A.
Static
B.
Dynamic
C.
Active
D.
None of the above
Ans.
C
37.
______________ is one of the ways to create active documents
A.
Java applet
B.
CGI
C.
GUI
D.
None of the above
Ans.
A
38.
Active documents are sometimes referred to as ______________ documents.
A.
Server-site dynamic
B.
Client-site dynamic
C.
both (a) and (b)
D.
None of the above
Ans.
B
39.
The ____________ is a protocol used mainly to access data on the World Wide
Web. It functions as a combination of FTP and SMTP.
A.
Domain Name System (DNS) protocol
B.
Simple Network Management Protocol (SNMP
C.
Hyper Text Transfer Protocol (HTTP)
D.
None of the above
Ans.
C
40.
HTTP uses the services of TCP on well-known port _____.
A.
70
B.
80
C.
60
D.
90
Ans.
B
41.
HTTP functions as a combination of ______ and _______.
A.
FTP; SMTP
B.
FTP; SNMP
C.
DNS; TFTP
D.
None of the above
Ans.
A
42. HTTP uses the services of
_________.
A.
TCP
B.
UDP
C.
SCTP
D.
None of the above
Ans.
A
43. A _________ protocol does not require the server to retain session
information or status about each communicating partner for the duration of
multiple requests.
A.
stateful
B.
stateless
C.
both (a) and (b)
D.
None of the above
Ans.
B
44.
HTTP itself is a _________ protocol.
A.
stateful
B.
stateless
C.
both (a) and (b)
D.
None of the above
Ans.
B
45.
A protocol that requires keeping of the internal state on the server is known
as a ________ protocol.
A.
stateful
B.
stateless
C.
both (a) and (b)
D.
None of the above
Ans.
A
46.
FTP and TELNET are ___________ protocols
A.
stateful
B.
stateless
C.
both (a) and (b)
D.
None of the above
Ans.
A
47.
In HTTP transaction, a request message consists of
A.
a request line, a header, and sometimes a body.
B.
a status line, a header, and sometimes a body.
C.
both (a) and (b)
D.
None of the above
Ans.
A
48.
In HTTP transaction, a request message always contains
A.
a request line and a header
B.
a status line and a header
C.
both (a) and (b)
D.
None of the above
Ans.
A
49. In HTTP transaction, a response message consists of
A.
a request line, a header, and sometimes a body.
B.
a status line, a header, and sometimes a body.
C.
both (a) and (b)
D.
None of the above
Ans.
B
50.
In HTTP transaction, a response message always contains
A.
a request line and a header
B.
a status line and a header
C.
both (a) and (b)
D.
None of the above
Ans.
B
51.
The first line in the request message is ______________; the first line in the
response message is _______________.
A.
status line; request line
B.
request line; status line
C.
both (a) and (b)
D.
None of the above
Ans.
B
52.
The most current version of HTTP is _____.
A.
0.9
B.
1.0
C.
1.1
D.
None of the above
Ans.
C
53.
Match the following between the column ‘Method’ and the column ‘Action’.
|
Method |
Action |
|
I. GET |
1.
Sends a document from the server to the client |
|
II. POST |
2.
Requests a document from the server |
|
III.
PUT |
3.
Sends some information from the client to the server |
|
IV HEAD |
4.
Requests information about a document but not the document itself. |
A.
I,1; II,3; III,2, IV, 4
B.
I,2; II,3; III,1; IV,4
C.
I,3; II,1; III;2; IV,4
D.
I,2; II,1; III,3; IV,4
Ans.
B
54. In HTTP, the ____________
exchanges additional information between the client and the server.
A.
Header
B.
Request line
C.
Status line
D.
None of the above
Ans.
A
55. Which of the following is
present in both an HTTP request line and a status line?
A.
HTTP version number
B.
status code
C.
URL
D.
None of the above
Ans.
A
56. A request message can contain
only
A.
General, Request headers
B.
General, Request and Entity headers
C.
Request, and Entity headers
D.
None of the above
Ans.
B
57. A response message can
contain only
A.
General, Response, and Entity headers.
B.
Response and Entity headers.
C.
General and Request headers.
D.
None of the above
Ans.
A
58. In a _____________________
connection, one TCP connection is made for each request/response.
A.
persistent
B.
nonpersistent
C.
both (a) and (b)
D.
None of the above
Ans.
B
59. In a _________________
connection, the server leaves the connection open for more requests after
sending a response.
A.
persistent
B.
nonpersistent
C.
both (a) and (b)
D.
None of the above
Ans.
A
60. HTTP version 1.1 specifies a
_______________ connection by default.
A.
persistent
B.
nonpersistent
C.
both (a) and (b)
D.
None of the above
Ans.
A
61. HTTP supports ________
servers which are computers that keep copies of responses to recent requests.
A.
parallel
B.
Proxy
C.
additional
D.
None of the above
Ans.
B
62. FTP
stands for ___________________.
A.
Fast Transfer Protocol
B.
File Transfer Protocol
C.
File Transit Protocol
D.
None of the above
Ans.
B
63.
FTP uses the services of _____.
A.
UDP
B.
TCP
C.
SCTP
D.
None of the above
Ans.
B
64. In FTP, a transaction may be of the following basic types:
A.
request, response, transfer
B.
request, response, transfer, terminate
C.
response, transfer, terminate
D.
None of the above
Ans.
B
65.
FTP establishes two connections between the hosts. One connection is used for
__________, the other for ____________.
A.
data transfer; control information
B.
data transfer; management data
C.
both (a) and(b)
D.
None of the above
Ans.
A
66.
FTP uses _____ well-known TCP ports.
A.
four
B.
three
C.
two
D.
None of the above
Ans.
C
67.
The well-known port ___ is used for the control connection and the well-known
port ____ for the data connection.
A.
18; 17
B.
19; 18
C.
21; 20
D.
20; 19
Ans.
C
68.
FTP is built on _____ architecture.
A.
Client-server
B.
P2P
C.
Data centric
D.
Service oriented
Ans.
A
69.
In FTP, _____________ is the service type used by the IP protocol because this
is an interactive connection between a user (human) and a server.
A.
minimize delay
B.
Maximize throughput
C.
minimize error
D.
None of the above
Ans.
A
70.
For the control connection, FTP uses the __________ character set.
A.
EBCDIC
B.
regular ASCII
C.
NVT ASCII
D.
None of the above
Ans.
C
71.
During an FTP session, the control connection is opened __________.
A.
exactly twice
B.
exactly once
C.
as many times as necessary
D.
None of the above
Ans.
B
72.
During an FTP session, the data connection is opend __________.
A.
exactly twice
B.
exactly once
C.
as many times as necessary
D.
None of the above
Ans.
C
73.
In FTP, a file can be organized into records, pages, or a stream of bytes.
These are types of an attribute called ____________.
A.
data structures
B.
file types
C.
transmission modes
D.
None of the above
Ans.
A
74.
In FTP, there are three types of __________: stream, block, and compressed
A.
data structures
B.
file types
C.
transmission modes
D.
None of the above
Ans.
C
75.
In FTP, ASCII, EBCDIC, and image define an attribute called _________.
A.
data structures
B.
file type
C.
transmission modes
D.
None of the above
Ans.
B
76.
In FTP, when we _________, it is copied from the server to the client.
A.
retrieve a file
B.
retrieve a list
C.
both (a) and (b)
D.
None of the above
Ans.
C
77.
In FTP, when we _________, it is copied from the client to the server.
A.
retrieve a list
B.
retrieve a file
C.
Store a file
D.
None of the above
Ans.
C
78.
Identify the incorrect statement regarding FTP.
A.
FTP stands for File Transfer Protocol
B.
FTP uses two parallel TCP connections
C.
FTP sends exactly one file over the data connection
D.
FTP sends its control information in-band
Ans.
D
79.
If 5 files are transferred from server A to client B in the same session. The
number of TCP connections between A and B is _______
A.
5
B.
6
C.
2
D.
10
Ans.
B
80.
FTP server _____________
A.
maintains state information
B.
is stateless
C.
has single TCP connection for a file transfer
D.
has UDP connection for file transfer
Ans.
A
81.
The commands, from client to server, and replies, from server to client, are
sent across the control connection in ________ bit ASCII format.
a)
3
b)
5
c)
7
d)
8
Ans.
C
82.
Find the FTP reply whose message is wrongly matched.
A.
331 – Username OK, password required
B.
425 – Can’t open data connection
C.
452 – Error writing file
D.
452 – Cannot open data connection
Ans.
D
83.
The data transfer mode of FTP, in which all the fragmenting has to be done by
TCP is ________
A.
Stream mode
B.
Block mode
C.
Compressed mode
D.
Message mode
Ans.
A
84.
The password is sent to the server using ________ command
A.
PASSWD
B.
PASS
C.
PASSWORD
D.
PWORD
Ans.
B
85.
The major difference between FTP and HTTP is that FTP is a _______ system (FTP
can be used to copy/move files from a server to a client as well as
upload/transfer files from a client to a server). HTTP, on the other hand, is
strictly ______: "transferring files from the server to a client".
A.
three-way; two-way
B.
two-way; one-way
C.
both (a) and (b)
D.
None of the above
Ans.
B
86.
Which of the following is/are true about Trivial File Transfer Protocol (TFTP)?
A.
TFTP is frequently used to allow diskless hosts to boot over the network.
B.
TFTP is implemented by the TFTP client program and by the TFTP server program.
C.
TFTP works on 69 Port number.
D. All of the above
Ans. D
87.
_______ is a complete, session-oriented, general purpose file transfer
protocol, and it can be used interactively. _______ is used as a bare-bones
special purpose file transfer protocol, and it allows only unidirectional
transfer of files.
A.
FTP; SCTP
B.
FTP; TFTP
C.
SNMP; TFTP
D.
None of the above
Ans.
B
88. ___________
are self-contained, modular, distributed, dynamic applications that can be
described, published, located or invoked over the network to create products,
processes, and supply chains.
A.
Web services
B.
internet services
C.
both (a) and (b)
D.
None of the above
Ans.
A
89. Which of the following is/are
true about web services?
A.
Web services are web application components.
B.
Web services can be published, found and used on the web.
C.
Web services are built on top of open standards such as TCP/IP, HTTP, Java,
HTML, and XML.
D.
All of the above
90. Web services are of two
types. They are:
A.
User centric and Application centric
B.
Active and Static
C.
both (a) and (b)
D.
None of the above
Ans.
A
91. Web services make full use of
the following open standards
A.
HTTP and Extensible Markup Language (XML),
B.
Simple Object Access Protocol (SOAP), and Web Services Description Language
(WSDL), and
C.
Universal Description Discovery and Integration (UDDI).
D.
All of the above
92. Benefits of using Web
Services are:
A.
Exposing the existing function onto network
B.
Connecting different applications (interoperability)
C.
Standardized Protocol and Low cost of communication
D.
All of the above
Ans.
D
93.
The first component of an electronic mail system is ___________________
A.
User Agent (UA)
B.
Manager
C.
both (a) and (b)
D.
None of the above
Ans.
A
94.
________________ provides service to the user to make the process of sending
and receiving a message easier.
A.
An MTA
B.
An MAA
C.
A UA
D.
None of the above
Ans.
C
95.
A _________ is a software package (program) that composes, reads, replies to
and forward messages. It also handle mailboxes.
A.
User Agent (UA)
B.
Manager
C.
both (a) and (b)
D.
None of the above
Ans.
A
96.
Services of a user agent are:
A.
Composing messages
B.
Reading messages & Replying to messages
C.
Forwarding messages & Handling mailboxes
D.
All of the above
Ans.
D
97.
Two types of user agents:
A.
Command-driven and Graphical User Interface-based (GUI-based)
B.
Command-driven and CGI
C.
both (a) and (b)
D.
None of the above
Ans.
A
98.
A _________ user agent accepts a one-character command from the keyboard to
perform its task.
A.
Command-driven
B.
GUI-based
C.
both (a) and (b)
D.
None of the above
Ans.
A
99.
Examples of command-driven user agents are
A.
mail
B.
pine
C.
elm
D.
All of the above
Ans.
D
100.
___________ contain Graphical User Interface (GUI) components to interact with
the software by using the keyboard and the mouse. They have graphical
components such as icons, menu bars, and windows that make the services easy to
access.
A.
Command-driven
B.
GUI-based
C.
both (a) and (b)
D.
None of the above
Ans.
B
101.
Examples of GUI-based user agents are
A.
Eudora
B.
Microsoft Outlook
C.
Netscape.
D.
All of the above
Ans.
D
102.
Email address consists of two parts: a _______ and a _______, separated by an
___ sign.
A.
local part; domain name; @
B.
local part; domain name; #
C.
remote part; domain name; @
D.
None of the above
Ans.
A
103.
____________________ is an Internet protocol used to send audio, video,
programs, graphics and other binary files.
A.
RFC 822
B.
Multipurpose Internet Mail Extensions (MIME)
C.
both (a) and (b)
D.
None of the above
Ans.
B
104.
__________ specifies how to convert the non-ASCII data into ASCII allowing it
to remain compatible with existing email protocols.
A.
RFC 822
B.
Multipurpose Internet Mail Extensions (MIME)
C.
both (a) and (b)
D.
None of the above
Ans.
B
105.
MIME defines _____ additional email header fields.
A.
3 B. 4 C. 5 D. 6
Ans.
C
106.
Email header fields are:
A.
MIME-Version
B.
Content-Type, and Content-Transfer-Encoding
C.
Content-ID, and Content-Description
D.
All of the above
Ans.
D
107.
When the sender and the receiver of an email are on the same system, we need
only ________.
A.
one UA
B.
two UAs
C.
3 UAs
D.
None of the above
Ans.
B
108.
When the sender and the receiver of an email are on different systems, we need
only ________.
A.
one UA
B.
two UAs
C.
two UAs and one pair of MTAs (client and server)
D.
None of the above
Ans.
C
109.
When the sender is connected to the mail server via a LAN or a WAN, we need
___________.
A.
two MTA
B.
two UAs and two pairs of MTAs (client and server)
C.
two UAs and one pair of MTAs
D.
None of the above
Ans.
B
110.
When both sender and receiver are connected to a mail server via a LAN or a
WAN, we need ______________________.
A.
two UAs, two pairs of MTAs, and a pair of MAAs
B.
two UAs, and two pairs of MTAs
C.
two UAs, two pairs of MTAs, and two pairs of MAAs
D.
None of the above
Ans.
A
111.
The actual mail transfer requires
A.
UAs
B.
Message Transfer Agents (MTAs)
C.
both (a) and (b)
D.
None of the above
Ans.
B
112.
The protocol that defines the MTA client and server in the Internet is called
________________________.
A.
Simple Network Management Protocol (SNMP)
B.
Simple Mail Transfer Protocol (SMTP)
C.
Post Office Protocol (POP)
D.
None of the above
Ans.
B
113.
SMTP is a _____________ protocol.
A.
push
B.
pull
C.
both (a) and (b)
D.
None of the above
Ans.
A
114.
_______ SMTP commands are used.
A.
11
B.
12
C.
13
D.
14
Ans.
D
115.
The process of transferring a mail message occurs in __________ phases.
A.
two
B.
three
C.
four
D.
five
Ans.
B
116.
The process of transferring a mail message occurs in the following phases.
A.
Connection establishment, Mail transfer, and Connection termination
B.
Connection establishment and Connection termination
C.
Mail transfer
D.
None of the above
Ans.
A
117.
Currently two message access protocols are available: __________________ and
_________________.
A.
Post Office Protocol (POP) version 3; Internet Message Access Protocol (IMAP4).
B.
Post Office Protocol (POP) version 3; Internet Group Management Protocol (IGMP)
C.
both (a) and (b)
D.
None of the above
Ans.
A
118.
Which of the following is/are true of POP3?
A.
POP3 is simple and limited functionality & POP3 client is needed on user
machine and POP3 server on the mail server machine.
B.
The client opens a connection to the server on TCP port 110.
C.
It then sends its user name and password to access the mailbox. User can then
access the email.
D.
All of the above
Ans.
D
119.
_______________ is more powerful and more complex than POP3.
A.
Internet Message Access Protocol (IMAP)
B.
Internet Group Management Protocol (IGMP)
C.
SMTP
D.
None of the above
Ans.
A
120.
Which of the following can be doing by a user with use of IMAP?
A.
A user can check the email header prior to downloading.
B.
A user can search the contents of the email for a specific string of characters
prior to downloading & a user can
partially download email
C.
A user can create, delete, or rename mailboxes on the mail server; a user can
create a hierarchy of mailboxes in a folder for email storage.
D.
All of the above
Ans.
D
121.
In the Web-based mail, mail transfer and retrieval requires
A.
MTA
B.
MAA
C.
the use of HTTP
D.
None of the above
Ans.
C
122.
TELNET is an abbreviation for __________________.
A.
telecommunication network
B.
telephone network
C.
terminal network
D.
None of the above
Ans.
C
123.
_______ allows you to connect and login to a remote computer
A.
FTP
B.
TELNET
C.
HTTP
D.
SMTP
Ans.
B
124.
TELNET is used for ____________.
A.
remote login
B.
television on net
C.
both (a) and (b)
D.
None of the above
Ans.
A
125.
TELNET is a ____________ Client/server application program.
A.
general-purpose
B.
specific-purpose
C.
both (a) and (b)
D.
None of the above
Ans.
A
126.
TELNET uses only one TCP connection. The server uses ________ port and the
client uses ________ port.
A.
a well-known; a registered
B.
a well-known; an ephemeral
C.
an ephemeral; a well-known
D.
a registered; an ephemeral
Ans.
B
127.
The _________________ is software residing on the remote system that allows the
remote system to receive characters from a TELNET server.
A.
pseudoterminal driver
B.
terminal driver
C.
both (a) and (b)
D.
None of the above
Ans.
A
128.
The ___________ translates local characters into NVT form.
A.
TELNET server
B.
TELNET client
C.
terminal driver
D.
None of the above
Ans.
B
129.
The ___________ translates NVT characters into a form acceptable by the remote
operating system.
A.
TELNET server
B.
TELNET client
C.
terminal driver
D.
None of the above
Ans.
A
130.
Which of the following statements is correct for “character at a time” mode?
A.
Most text typed is immediately sent to the remote host for processing
B.
Character processing is done on the local system under the control of the
remote system
C.
All text is echoed locally, only completed lines are sent to the remote host
D.
All text is processed locally, and only confirmed lines are sent to the remote
host
Ans.
A
131.
What is the correct syntax to be written in the web browser to initiate a TELNET
connection to www.xyz.com?
A.
TELNET//www.xyz.com
B.
TELNET:www.xyz.com
C.
TELNET www.xyz.com
D.
TELNET://www.xyz.com
Ans.
D
132.
Which one of the following is not correct?
A.
TELNET is a general purpose client-server program.
B.
TELNET lets user access an application on a remote computer.
C.
TELNET can be used for remote login.
D.
TELNET can also be used for file transfer.
Ans.
D
133.
TELNET operates in three modes: _____________, ____________ and ______________.
A.
default mode; character mode; line mode
B.
default mode; character mode; transmission mode
C.
character mode; line mode; transmission mode
D.
None of the above
Ans.
A
134.
Which operating mode of TELNET is full duplex?
A.
default mode
B.
server mode
C.
character mode
D.
line mode
Ans.
D
135.
If we want that a character be interpreted by the client instead of server
_________
A.
control functions has to be disabled
B.
it is not possible
C.
cli character has to be used
D.
interpret as command (IAC) escape character has to be used
Ans.
D
136.
If the sender wants to disable an option, it sends a __________ command.
A.
WILL
B.
WONT
C.
DO
D.
DONT
Ans.
B
137.
If the sender wants to enable an option, it sends a __________ command.
A.
WILL
B.
WONT
C.
DO
D.
DONT
Ans.
A
138.
If the sender wants an option disabled by the receiver, it sends a __________
command.
A.
WILL
B.
WONT
C.
DO
D.
DONT
Ans.
D
139.
Secure Shell (SSH) network protocolis used for ____________.
A.
secure data communication
B.
remote command-line login
C.
remote command execution
D.
All of the above
Ans.
D
140.
SSH can be used in only _____________.
A.
Unix-like operating systems
B.
Windows
C.
both (a) and (b)
D.
None of the above
Ans.
C
141.
SSH uses ___________ to authenticate the remote computer.
A.
private-key cryptography
B.
public-key cryptography
C.
either (a) or (b)
D.
None of the above
Ans.
B
142.
Which standard TCP port is assigned for contacting SSH servers?
A.
port 20
B.
port 21
C.
port 22
D.
port 23
Ans.
C
143.
Which one of the following protocol can be used for login to a shell on a
remote host except SSH?
A.
TELNET
B. rlogin
C.
both TELNET and rlogin
D.
None of the mentioned
Answer:
C
144.
Which one of the following is a file transfer protocol using SSH?
A.
SFTP
B.
SCP
C.
Rsync
d)
All of the above
Ans:
D
145.
SSH-2 does not contain ______________
A.
transport layer
B. user authentication layer
C. connection layer
D. physical layer
Answer:
D
146.
Which one of the following feature was present in SSH protocol, version 1?
A.
password changing
B.
periodic replacement of session keys
C.
support for public-key certificates
D.
None of the above
Ans:
D
147.
Which one of the following feature was present in SSH-2 protocol, version 2?
A.
password changing
B.
periodic replacement of session keys
C.
support for public-key certificates
D.
All of the above
Ans:
D
148.
SCP protocol is evolved from __________ over SSH.
A.
DHCP protocol
B.
MGCP protocol
C.
GCP protocol
D.
Rate Control Protocol (RCP)
Answer:
D
149.
Which one of the following authentication method is used by SSH?
A.
host-based
B.
public-key
C.
password
D.
All of the above
Ans.
D
150.
Which of the following is/are true about DNS?
A.
DNS protocol runs over UDP and uses port 53.
B.
DNS is specified in RFC 1034 and RFC 1035.
C.
DNS is the application layer protocol.
D.
All of the above
Ans.
D
151.
Domain Name System (DNS) is responsible for ____________________.
A.
DNS converts domain names (of the form www.xyz.com) into IP numbers
B.
DNS is routing the packets.
C.
both (a) and (b)
D.
None of the above
Ans.
A
152. If a label is terminated by
a null string, it is called a _______________________________ which is a domain
name that contains the full name of a host.
A.
Fully Qualified Domain Name (FQDN)
B.
Partially Qualified Domain Name (PQDN)
C.
Both (a) and (b)
D.
None of the above
Ans.
A
153.
Which of the following service(s) is/are provided by DNS?
A.
Host aliasing
B.
Mail server aliasing
C.
Load distribution
D.
All of the above
Ans.
D
154. If a label is not terminated
by a null string, it is called a _____________________________.
A.
Fully Qualified Domain Name (FQDN)
B.
Partially Qualified Domain Name (PQDN)
C.
Both (a) and (b)
D.
None of the above
Ans.
B
155. A ______________ is a
subtree of the domain name space.
A.
zone
B.
label
C.
domain
D.
None of the above
Ans.
C
156. Which of the following
is/are true about zone?
A.
In a zone, server has both
responsibility and authority.
B.
Domain and zone refers to the same thing, if a server accepts responsibility
for a domain and does not divide the domain into smaller domains.
C.
If a server divides its domain into subdomains and delegates part of its
authority to other servers, domain and zone refer to different things.
D.
All of the above
Ans.
D
157. In the Internet, the DNS
(tree) is divided into ________ different sections.
A.
two
B.
three
C.
four
D.
five
Ans.
B
158. Three sections of DNs in the
internet are
A.
Generic domains, Country domains and Inverse domains
B.
Generic domains, Country domains and subdomains
C.
Generic domains, Country domains and zone
D.
None of the above
Ans.
A
159. The __________ define
registered hosts according to their generic behavior. Each node in the tree
defines a domain, which is an index to the domain name space database.
A.
Generic domains
B.
country domains
C.
inverse domains
D.
None of the above
Ans.
A
160. The _______________ section
uses two-character country abbreviations. Second labels can be organizational, or
they can be more specific, national designations.
A.
Generic domains
B.
country domains
C.
inverse domains
D.
None of the above
Ans.
B
161. The ___________ is used to
map an address to a name.
A.
Generic domains
B.
country domains
C.
inverse domains
D.
None of the above
Ans.
C
162. A name space that maps each
address to a unique name can be organized in the following ways:
A.
Flat Name Space
B.
Hierarchical Name Space
C.
both (a) and (b)
D.
None of the above
Ans.
C
163. Which of the following
is/are true about Flat name space?
A.
In a flat name space, a name is assigned to an address.
B.
A name in this space is a sequence of characters without structure.
C.
The main disadvantage of a flat name space is that it cannot be used in a large
system such as the Internet because it must be centrally controlled to avoid
ambiguity and duplication.
D.
All of the above
164. Which of the following
is/are true about Hierarchical name space?
A.
In a hierarchical name space, each name is made of several parts.
B.
The first part can define the nature of the organization, the second part can
define the name of an organization, and the third part can define departments
in the organization, and so on.
C.
The organization can add suffixes (or prefixes) to the name to define its host
or resources.
D.
All of the above
Ans.
D
165. In DNS, the names are
defined in an inverted-tree structure with the root at the top.
The tree can have only ______
levels; level 0 (root) to level _______.
A.
128, 127
B.
127, 126
C.
126, 125
D.
125, 124
Ans.
A
166. Each node in the tree has a
label, which is a string with a maximum of _____ characters.
The root label is a ____ string.
A.
62, null
B.
63, null
C.
62, null
D.
64, null
Ans.
B
167. If a zone consists of the
full tree, then that zone server is called ___________ which
do not maintain any information about domains.
A.
root server
B.
primary server
C.
secondary server
D.
None of the above
Ans.
A
168. A _________________ is a
server that stores a file about the zone for which it is an authority. It is
responsible for creating, maintaining, and updating the zone file. It stores
the zone file on a local disk.
A.
root server
B.
primary server
C.
secondary server
D.
None of the above
Ans.
B
169. A _______________ is a
server that transfers the complete information about a zone from another server
(primary or secondary) and stores the file on its local disk.It neither creates
nor updates the zone files. If updating is required, it must be done by the
primary server, which sends the updated version to the secondary.
A.
root server
B.
primary server
C.
secondary server
D.
None of the above
Ans.
C
170.
__________________________ is a framework for managing devices in an internet
using the TCP/IP protocol suite.
It
provides a set of fundamental operations for monitoring and maintaining an
internet.
A.
Simple Mail Transfer Protocol (SMTP)
B.
Simple Network Management Protocol (SNMP)
C.
File Transfer Protocol (FTP)
D.
None of the above
Ans.
B
171. Which of the following
is/are true about SNMP?
A.
SNMP uses the concept of manager and agent.
B.
A manager (host) is used to control and monitor a set of agents (routers).
C.
SNMP is an application-level protocol in which a few manager stations control a
set of agents.
D.
All of the above
Ans.
D
172. SNMP defines the
________________ to be sent from a manager to an agent and vice versa.
A.
number of packets received
B.
number of packets forwarded
C.
format of the packets
D.
encoding of the packets
Ans.
C
173. A management station, called
a manager, is a host that runs the SNMP __________ program.
A.
server
B.
client
C.
both (a) and (b)
D.
None of the above
Ans.
B
174. A managed station, called an
agent, is a router (or a host) that runs the SNMP _______ program.
A.
server
B.
client
C.
both (a) and (b)
D.
None of the above
Ans.
A
175. Which of the following
is/are basis for Management with SNMP?
A.
A manager checks an agent by requesting information that reflect the behavior
of the agent.
B.
A manager forces an agent to perform a task by resetting values in the agent database.
C.
An agent contributes to the management process by warning the manager of an
unusual situation.
D.
All of the above
Ans.
D
176. To do management tasks, SNMP
uses two other protocols: ________________ and ___________________.
A.
Structure of Management Information (SMI); Management Information Base (MIB)
B.
Structure of Management Information (SMI); Trivial File Transfer Protocol
(TFTP)
c.
Trivial File Transfer Protocol (TFTP); Remote Procedure Call (RPC)
D.
None of the above
Ans.
A
177. ___________ defines the
general rules for naming objects, defining object types (including range and
length), and showing how to encode objects and values.
A.
SMI
B.
MIB
C.
both (a) and (b)
D.
None of the above
Ans.
A
178. _______ creates a collection
of named objects, their types, and their relationships to each other in an
entity to be managed.
A.
SMI
B.
MIB
C.
both (a) and (b)
D.
None of the above
Ans.
B
179. Functions of SMIv2 are:
A.
To name objects
B.
To define the type of data that can be stored in an object.
C.
To show how to encode data for transmission over the network.
D.
All of the above
Ans.
D
180. SMI emphasizes three
attributes to handle an object: _______, _____, and ________.
A.
name; data type; encoding method
B.
name; data type; size
C.
name; size; encoding method
D.
None of the above
Ans.
A
181. SMI has two broad categories
of data type:_______ and _________.
A.
Simple; complex
B.
Simple; Structured
C.
both (a) and (b)
D.
None of the above
Ans.
B
182. The __________ data types
are atomic data types.
A.
structure
B.
simple
C.
both (a) and (b)
D.
None of the above
Ans.
B
183. SMI defines two structured
data types: ________ and _______.
A.
sequence; order
B.
sequence and sequence of
C.
complex; sequence
D.
None of the above
Ans.
B
184. SMI uses ____________ to
encode data to be transmitted over the network.
A.
Basic Encoding Rules (BER)
B.
MIB
C.
both (a) and (b)
D.
None of the above
Ans.
A
185. The objects in MIB2 are
categorized under _____ different groups.
A.
9
B.
10
C.
11
D.
12
Ans.
B
186. SNMP is an application
program that allows the following.
A.
A manager to retrieve the value of an object defined in an agent.
B.
A manager to store a value in an object defined in an agent.
C.
An agent to send an alarm message about an abnormal situation to the manager.
D.
All of the above
Ans.
D
187. SNMPv3 defines ________
types of packets (or PDUs).
A.
7
B.
8
C.
9
D.
10
Ans.
B
188. SNMP PDU has fields: PDU
type, Request ID, __________, __________
and __________.
A.
Error status
B.
Error index
C.
VarBind list
D.
All of the above
Ans.
D
189. SNMP does not send only a
PDU; it embeds the PDU in a ___________.
A.
packet
B.
message
C.
segment
D.
None of the above
Ans.
B
190. A message in ________ is
made of four elements: Version, Header, Security parameters and Data.
A.
SNMPv3
B.
SMTP
C.
TFTP
D.
None of the above
Ans.
A
191. SNMP uses the services of
_____.
A.
TCP
B.
UDP
C.
both (a) and (b)
D.
None of the above
Ans.
B
192. The well-known port _____ is
used by the server (agent) whereas the well-known port _____ is used by the
client (manager).
A.
162;163
B.
161;162
C.
163;164
D.
160;161
Ans.
B
193.
The GetRequest PDU is sent from the _________ to the __________ retrieve the value of a variable or a set of
variables.
A.
client; server
B.
server; client
C.
client; network
D.
None of the abve
Ans.
A
194.
The response PDU is sent from the _________ to the ________ to report an event.
A.
client; server
B.
server; client
C.
client; network
D.
None of the abve
Ans.
B
195.
INTEGER, OCTET STRING, and ObjectIdentifier are ___________ definitions used by
SMI.
A.
ASN.1
B.
MIB
C.
SNMP
D.
None of the above
Ans.
A
196.
Which of the following could be a legitimate MIB object identifier?
A.
1.3.6.1.2.1.1
B.
1.3.6.1.2.2.1
C.
2.3.6.1.2.1.2
D.
3.3.6.1.2.1.2
Ans.
A
197.
Which is a manager duty?
A.
Retrieve the value of an object defined in an agent
B.
Store the value of an object defiend in an agent
C.
both (a) and (b)
D.
None of the above
Ans.D
198.
For a 1-byte length field, what is the maximum value for the data length?
A.
127
B.
128
C.
255
D.
None of the above
Ans.127
199.
An object id defines a _________. Add a zero suffix to define the ________.
A.
variable; table
B.
table; variable
C.
variable; variable contents
D.
None of the above
Ans.
C
200.
An SNMP agent can send ________ messages.
A.
GetRequest
B.
SetRequest
C.
Trap
D.
None of the above
Ans.
C
201.
An SNMP agent can send __________ messages.
A.
Response
B.
GetRequest
C.
SetRequest
D.
None of the above
Ans.
A
202.
The __________ field in the SNMP PDU is an offset that points to the variable
in error.
A.
community
B.
enterprise
C.
error index
D.
None of the above
Ans.
C
Dr. Selvaganesan
Dept of IT, JJCET
No comments:
Post a Comment