NETWORKING - APPLICATION LAYER PROTOCOLS MCQ
- In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?
 - Which of the following is/are example(s) of stateful application layer protocols?
 - Which of the following is the Application layer protocol in Internet Protocol Suite?
 - The Application layer in TCP/IP contains the ___________ protocols
 - Which of the following is the Application layer protocol in OSI model?
 - Identify the correct order in which the following actions take place in an interaction between a web browser and a web server
 - What does HTTPS stands for?
 - Which of the following protocol is used to retrieve emails?
 - Which of the following protocol is used to send email?
 - Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
 - Application layer protocol defines
 - Which one of the following protocol delivers/stores mail to receiver server?
 - The ASCII encoding of binary data is called
 - Which one of the following is not an application layer protocol?
 - Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?
 - Which one of the following is not correct?
 - When displaying a web page, the application layer uses the
 - This is not a application layer protocol
 - The chunk of information at the application layer is called
 - Electronic mail uses this Application layer protocol
 - Which of the following is/are Protocols of Application layer?
 - This is an application protocol that uses the Internet's TCP/IP protocols to transfer Web page files to a server. It\'s also used to download programs and other files from a server to your computer
 - Telnet protocol is used to establish a connection to
 - Which one of the following is false?
 - All telnet operations are sent as
 - AbsoluteTelnet is a telnet client for
 - The decimal code of interpret as command (IAC) character is
 - In character mode operation of telnet implementation
 - In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in
 - Which one of the following is not correct regarding telent?
 - Which operating mode of telnet is full duplex?
 - If we want that a character be interpreted by the client instead of server
 - The protocol used by Telnet application is
 - ______ allows you to connect and login to a remote computer
 - The correct syntax for accessing the telnet is
 - Multiple object can be sent over a TCP connection between client and server in
 - HTTP is ________ protocol
 - In the network HTTP resources are located by
 - HTTP client requests by establishing a __________ connection to a particular port on the server
 - In HTTP pipelining
 - FTP server listens for connection on port number
 - In FTP, client contacts server using ____ as the transport protocol
 - In which mode FTP, the client initiates both the control and data connections
 - The file transfer protocol is built on
 - In file transfer protocol, data transfer can be done in
 - What is the port number for HTTP?
 - The ______ method when used in the method field, leaves entity body empty
 - Which of the following is not correct ?
 - The conditional GET mechanism
 - Which of the following is present in both an HTTP request line and a status line?
 - Ping can
 - Ping sweep is a part of
 - ICMP is used in
 - This allows to check if a domain is available for registration
 - Expansion of FTP is
 - FTP uses _____ parallel TCP connections to transfer a file
 - Identify the incorrect statement
 - If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is
 - FTP server
 - The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
 - Find the FTP reply whose message is wrongly matched
 - Mode of data transfer in FTP, where all the is left to TCP
 - In FTP, the password is sent to the server using _____ command
 - Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer
 - SMTP connections secured by SSL are known as
 - SMTP uses the TCP port
 - Which one of the following protocol is used to receive mail messages?
 - What is on-demand mail relay (ODMR)?
 - An email client needs to know the ____ of its initial SMTP server
 - A SMTP session may include
 - SMTP (Simple mail transfer protocol) defines
 - Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?
 - SMTP is used to deliver messages to
 - When the mail server sends mail to other mail servers it becomes _____ ?
 - If you have to send multimedia data over SMTP it has to be encoded into
 - Expansion of SMTP is
 - In SMTP, the command to write recievers mail adress is written with this command
 - The underlying Transport layer protocol used by SMTP is
 - Choose the statement which is incorrect incase of SMTP
 - Internet mail places each object in
 - Typically the TCP port used by SMTP is
 - A session may include
 - Example of user agents for e-mail
 - When the sender and the receiver of an email are on different systems, we need only ______
 - TELNET is an abbreviation for ____________
 - TELNET is a ________ client-server application program
 - When a user logs into a local time-sharing system, it is called ________ login
 - When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login
 - NVT uses two sets of characters, one for _____and one for __________
 - For data, NVT uses US ASCII characters with the highest order bit set to ______
 - For control, NVT uses US ASCII characters with the highest order bit set to ______
 - TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port
 - To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________
 - In the _______ mode, the echoing is done by the client
 - In the _______ mode, each character typed is sent by the client to the server
 - In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client
 - The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server
 - The _______ translates local characters into NVT form
 - The _______ translates NVT characters into a form acceptable by the remote operating system
 - If the sender wants to disable an option, it sends a _______ command
 - If the sender wants to enable an option, it sends a _______ command
 - If the sender wants an option disabled by the receiver, it sends a _______ command
 - If the sender wants an option enabled by the receiver, it sends a _______ command
 - SNMP defines the ___________________ to be sent from a manager to an agent and vice versa
 - A manager is a host that runs the SNMP _______ process
 - An agent is a host or computer that runs the SNMP _______ process
 - SNMP uses two other protocols:________ and _________
 - _______ defines the general rules for naming objects, defining object types, and showing how to encode objects and values
 - We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________
 - We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________
 - We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______
 - SMI emphasizes three attributes to handle an object: _____, ________, and _________
 - To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure
 - All objects managed by SNMP are given an object identifier. The object identifier always starts with _______
 - To define the data type, SMI uses fundamental _______ definitions and adds some new definitions
 - SMI has two broad categories of data type: _______ and _______
 - The _______ data types are atomic data types
 - SMI defines two structured data types: ________ and _________
 - SMI uses another standard, ___________, to encode data to be transmitted over the network
 - The _________ ordering enables a manager to access a set of variables one after another by defining the first variable
 - The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables
 - The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest
 - The Trap PDU is sent from the ______ to the _______ to report an event
 - SNMP uses the services of UDP on two well-known ports, _______ and _______
 - _______ runs the SNMP client program _______ runs the SNMP server program
 - INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI
 - Which of the following could be a legitimate MIB object identifier?
 - For a 1-byte length field, what is the maximum value for the data length?
 - An object id defines a _______. Add a zero suffix to define the _______
 - An SNMP agent can send _______ messages
 - The _______ field in the SNMP PDU is an offset that points to the variable in error
 - The _______ field in the SNMP PDU reports an error in a response message
 - The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values
 - We can divide audio and video services into _______ broad categories
 - _______ audio/video refers to on-demand requests for compressed audio/video files
 - __________ audio/video refers to the broadcasting of radio and TV programs through the Internet
 - ________ audio/video refers to the use of the Internet for interactive audio/video applications
 - According to the Nyquist theorem, we need to sample an analog signal ________times the highest frequency
 - In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values
 - _________ encoding is based on the science of psychoacoustics, which is the study of how people perceive sound
 - ___________ is used to compress images
 - ___________ is used to compress video
 - The first phase of JPEG is ___________
 - The second phase of JPEG is ___________
 - The third phase of JPEG is ___________
 - Jitter is introduced in real-time data by the _______________
 - To prevent _________, we can timestamp the packets and separate the arrival time from the playback time
 - A ________buffer is required for real-time traffic
 - A __________on each packet is required for real-time traffic
 - Real-time traffic needs the support of ____________
 - _________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network
 - _________ means combining several streams of traffic into one stream
 - ________ is not suitable for interactive multimedia traffic because it retransmits packets in case of errors
 - ________ is the protocol designed to handle real-time traffic on the Internet
 - RTP uses a temporary even-numbered _______ port
 - ___________ is a protocol for controlling the flow and quality of data
 - RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP
 - __________ is an application protocol that establishes, manages, and terminates a multimedia session
 - ______ is a standard to allow telephones on the public telephone network to talk to computers connected to the Internet
 - A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance
 - A _______ shows the time a packet was produced relative to the first or previous packet
 - ______ are used to number the packets of a real-time transmission
 - In a real-time video conference, data from the server is _______ to the client sites
 - A _______ adds signals from different sources to create a single signal
 - A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal
 - An RTP packet is encapsulated in _______
 - When there is more than one source, the _______ identifier defines the mixer
 - What is the port number of the HTTP ?
 - What is the port number of the SMTP ?
 - Using POP3, the e-mails are stored at
 - To access e-mails from any machine and anywhere, we use
 - SMTP is used to transfer
 - Using IMAP, the e-mails are stored at
 - What is the port number for (Post Office Protocol) POP3?
 - Port number for ECHO?
 - What is the port number for SSH Remote login service?
 - PPP provides a protocol for bringing lines up, testing them, negotiating options, and bringing them down again gracefully when they are no longer needed. This protocol is known as:
 - PPP handles
 - What is the port number for (File Transfer Protocol - Control) FTP?
 - Port number for (Secure Shell) SSH?
 - The program that accepts the commands for composing, receiving and replying to messages, as well as for manipulating mail boxes is
 - A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2-hours. The time required for the transfer is hours if synchronization is not provided
 - What is the port number for (Trivial File Transfer Protocol) TFTP?
 - What is the port number for Gopher services?
 - To translate the message semantics from one format to other, ............... is used
 - A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
 - What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
 - What protocol is used between E-Mail servers?
 - Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
 - What is the port number for POP3?
 - Which of the following file retrieval methods use hypermedia?
 - What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?
 - Bulletin board system
 - Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?
 - To set up a bulletin board system you need
 - The application layer of a network
 - In Remote Logging, a user logs into a local timesharing system, it is called
 - In File Transfer Protocol (FTP), while the control connection is open, the data connection can be opened and closed
 - File Transfer Protocol (FTP), uses the same operation used by
 - File Transfer Protocol (FTP), uses the well-known port 21 is used for the control connection and port 20 for the
 - In the architecture of e-mail, we can have
 - In File Transfer Protocol (FTP), a user needs an account (user name) and a password on the
 - In EMAIL, We need two VAs and two pairs of MTAs, When the sender is connected to the mail server via
 - Mail access starts with the client when the user needs to download e-mail from the
 - TELNET is a general-purpose
 - Example of command-driven user agents are
 - When the sender and the receiver of an e-mail are on the same system, we need only two
 - The command of End-of-File in the UNIX operating system is
 - Most TELNET implementations operate in one of the modes
 - An Email can have fields like, a number, a sender, size of the message and
 - Examples of GUI based user agents are Eudora, netscape and
 - In electronic mail, the MTA transfers the mail across the Internet via
 - The well-known port used for FTP\'s control connection is
 - MTA stands for
 - FTP copies a file from
 - The three modes of TELNET implementations are default mode, character mode and
 - When the sender and the receiver of an e-mail are on different systems, we need two VAs and a pair of
 - When the sender and the receiver of an e-mail are on the same system, we need only
 - In File Transfer Protocol (FTP), the data connection is opened and then closed for each
 - Post Office Protocol, version 3 (POP3), has two modes, Delete Mode and
 - The FTP uses the services of
 - NVT Stands for
 - Post Office Protocol, version 3 (POP3) is simple and limited in
 - At the beginning of the Internet era, the messages sent by electronic mail were short and consisted of
 
                        
        
    
Networks
(d).Both a and b
need an explanation for this answer? contact us directly to get an explanation for this answer