41.
The ……… protocol is based on end-toend
delivery.
a.
SMTP
b.
TCP
c.
IP
d.
SCTP
Answer:
Option(a)
42.
The well-known port of the SMTP server
is …….
a.
110
b.
25
c.
50
d.
20
Answer:
Option(b)
43. In the SMTP header field_____ is a summary of the message being sent which is specified by the sender.
a.
Reply-to
b.
Return-path
c.
Subject
d.
From
Answer:
Option(c)
44. In the SMTP herder field_____ is added by the final transport system that delivers the mail.
a.
Reply-to
b.
Return-path
c.
Subject
d.
From
Answer:
Option(b)
45. In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ……….
a.
220 service ready message
b.
421 service not available message
c.
Both of the above
d.
None of the above
Answer:
Option(c)
46. In the MIME header field____describes how the object within the body is to be interpreted.
a.
content-type
b.
content-transfer-encoding
c.
content-description
d.
content-id
Answer:
Option(a)
47. In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form.
a.
content-type
b.
content-transfer-encoding
c.
content-description
d.
content-id
Answer:
Option(b)
48. In a/an ………… of DNS resolver, the queried name server can return the best answer it currently has back to the DNS resolver.
a.
Recursive queries
b. Iterative queries
c.
Reverse queries
d.
Inverse queries
Answer:
Option(b)
49. The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model.
a.
data link
b.
network
c.
physical
d.
application
Answer:
Option(d)
50. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________
a.
Application layer
b.
Transport layer
c.
Link layer
d.
Session layer
Answer:
Option(a)
51.
Which layer provides the services to user?
a.
application layer
b.
session layer
c.
presentation layer
d.
physical layer
Answer:
Option(a)
52.
Application layer protocol defines ____
a.
types of messages exchanged
b.
message format, syntax and semantics
c. rules for when and how processes send and respond to messages
d.
all of the mentioned
Answer:
Option(d)
53. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
a.
HTTP
b.
FTP
c.
Telnet
d.
TCP
Answer:
Option(c)
54. The ASCII encoding of binary data is called
a.
base 64 encoding
b.
base 32 encoding
c.
base 16 encoding
d.
base 8 encoding
Answer:
Option(a)
55. Consider different activities related to email:
m1: Send an email from a mail client to a mail server
m2:
Download an email from mailbox server
to
a mail client
m3: Checking email in a web browser
Which is the application level protocol used in
each
activity?
a.
m1: HTTP m2: SMTP m3: POP
b.
m1: SMTP m2: FTP m3: HTTP
c.
m1: SMTP m2: POP m3: HTTP
d.
m1: POP m2: SMTP m3: IMAP
Answer:
Option(c)
56. Identify the correct order in which the following actions take place in an interaction between a web browser and a web server.
1. The web browser requests a webpage using HTTP.
2. The web browser establishes a TCP connection with the web server.
3. The web server sends the requested webpage using HTTP.
4. The web browser resolves the domain name using DNS.
a.
4,2,1,3
b.
1,2,3,4
c.
4,1,2,3
d.
2,4,1,3
Answer:
Option(a)
57.
In one of the pairs of protocols given
below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?
a.
HTTP, FTP
b.
HTTP, TELNET
c.
FTP, SMTP
d.
HTTP, SMTP
Answer:
Option(a)
58. Which one of the following statements is NOT correct about HTTP cookies?
a. A cookies is a piece of code that has the potential to compromise the security of an Internet user
b.
A cookie gains entry to the user’s
work
area through an HTTP header
c.
A cookie has an expiry date and time
d. Cookies can be used to track the browsing pattern of a user at a particular site
Answer:
Option(a)
59. Which of the following is/are example(s) of stateful application layer protocols?
(i)
HTTP
(ii)
FTP
(iii)
TCP
(iv)
POP3
a.
(i) and (ii) only
b.
(ii) and (iii) only
c.
(ii) and (iv) only
d.
(iv) only
Answer:
Option(c)
60. Which of the following protocol is used for transferring electronic mail messages from one machine to another?
a.
TELNET
b.
FTP
c.
SNMP
d.
SMTP
Answer:
Option(d)
1 Comments
wow great
ReplyDelete