Q:
According to the Nyquist theorem, we need to sample an analog signal ________times the highest frequency
belongs to collection: NETWORKING - APPLICATION LAYER PROTOCOLS MCQ
NETWORKING - APPLICATION LAYER PROTOCOLS MCQ
- In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?
- Which of the following is/are example(s) of stateful application layer protocols?
- Which of the following is the Application layer protocol in Internet Protocol Suite?
- The Application layer in TCP/IP contains the ___________ protocols
- Which of the following is the Application layer protocol in OSI model?
- Identify the correct order in which the following actions take place in an interaction between a web browser and a web server
- What does HTTPS stands for?
- Which of the following protocol is used to retrieve emails?
- Which of the following protocol is used to send email?
- Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
- Application layer protocol defines
- Which one of the following protocol delivers/stores mail to receiver server?
- The ASCII encoding of binary data is called
- Which one of the following is not an application layer protocol?
- Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?
- Which one of the following is not correct?
- When displaying a web page, the application layer uses the
- This is not a application layer protocol
- The chunk of information at the application layer is called
- Electronic mail uses this Application layer protocol
- Which of the following is/are Protocols of Application layer?
- This is an application protocol that uses the Internet's TCP/IP protocols to transfer Web page files to a server. It\'s also used to download programs and other files from a server to your computer
- Telnet protocol is used to establish a connection to
- Which one of the following is false?
- All telnet operations are sent as
- AbsoluteTelnet is a telnet client for
- The decimal code of interpret as command (IAC) character is
- In character mode operation of telnet implementation
- In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in
- Which one of the following is not correct regarding telent?
- Which operating mode of telnet is full duplex?
- If we want that a character be interpreted by the client instead of server
- The protocol used by Telnet application is
- ______ allows you to connect and login to a remote computer
- The correct syntax for accessing the telnet is
- Multiple object can be sent over a TCP connection between client and server in
- HTTP is ________ protocol
- In the network HTTP resources are located by
- HTTP client requests by establishing a __________ connection to a particular port on the server
- In HTTP pipelining
- FTP server listens for connection on port number
- In FTP, client contacts server using ____ as the transport protocol
- In which mode FTP, the client initiates both the control and data connections
- The file transfer protocol is built on
- In file transfer protocol, data transfer can be done in
- What is the port number for HTTP?
- The ______ method when used in the method field, leaves entity body empty
- Which of the following is not correct ?
- The conditional GET mechanism
- Which of the following is present in both an HTTP request line and a status line?
- Ping can
- Ping sweep is a part of
- ICMP is used in
- This allows to check if a domain is available for registration
- Expansion of FTP is
- FTP uses _____ parallel TCP connections to transfer a file
- Identify the incorrect statement
- If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is
- FTP server
- The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
- Find the FTP reply whose message is wrongly matched
- Mode of data transfer in FTP, where all the is left to TCP
- In FTP, the password is sent to the server using _____ command
- Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer
- SMTP connections secured by SSL are known as
- SMTP uses the TCP port
- Which one of the following protocol is used to receive mail messages?
- What is on-demand mail relay (ODMR)?
- An email client needs to know the ____ of its initial SMTP server
- A SMTP session may include
- SMTP (Simple mail transfer protocol) defines
- Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?
- SMTP is used to deliver messages to
- When the mail server sends mail to other mail servers it becomes _____ ?
- If you have to send multimedia data over SMTP it has to be encoded into
- Expansion of SMTP is
- In SMTP, the command to write recievers mail adress is written with this command
- The underlying Transport layer protocol used by SMTP is
- Choose the statement which is incorrect incase of SMTP
- Internet mail places each object in
- Typically the TCP port used by SMTP is
- A session may include
- Example of user agents for e-mail
- When the sender and the receiver of an email are on different systems, we need only ______
- TELNET is an abbreviation for ____________
- TELNET is a ________ client-server application program
- When a user logs into a local time-sharing system, it is called ________ login
- When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login
- NVT uses two sets of characters, one for _____and one for __________
- For data, NVT uses US ASCII characters with the highest order bit set to ______
- For control, NVT uses US ASCII characters with the highest order bit set to ______
- TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port
- To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________
- In the _______ mode, the echoing is done by the client
- In the _______ mode, each character typed is sent by the client to the server
- In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client
- The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server
- The _______ translates local characters into NVT form
- The _______ translates NVT characters into a form acceptable by the remote operating system
- If the sender wants to disable an option, it sends a _______ command
- If the sender wants to enable an option, it sends a _______ command
- If the sender wants an option disabled by the receiver, it sends a _______ command
- If the sender wants an option enabled by the receiver, it sends a _______ command
- SNMP defines the ___________________ to be sent from a manager to an agent and vice versa
- A manager is a host that runs the SNMP _______ process
- An agent is a host or computer that runs the SNMP _______ process
- SNMP uses two other protocols:________ and _________
- _______ defines the general rules for naming objects, defining object types, and showing how to encode objects and values
- We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________
- We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________
- We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______
- SMI emphasizes three attributes to handle an object: _____, ________, and _________
- To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure
- All objects managed by SNMP are given an object identifier. The object identifier always starts with _______
- To define the data type, SMI uses fundamental _______ definitions and adds some new definitions
- SMI has two broad categories of data type: _______ and _______
- The _______ data types are atomic data types
- SMI defines two structured data types: ________ and _________
- SMI uses another standard, ___________, to encode data to be transmitted over the network
- The _________ ordering enables a manager to access a set of variables one after another by defining the first variable
- The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables
- The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest
- The Trap PDU is sent from the ______ to the _______ to report an event
- SNMP uses the services of UDP on two well-known ports, _______ and _______
- _______ runs the SNMP client program _______ runs the SNMP server program
- INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI
- Which of the following could be a legitimate MIB object identifier?
- For a 1-byte length field, what is the maximum value for the data length?
- An object id defines a _______. Add a zero suffix to define the _______
- An SNMP agent can send _______ messages
- The _______ field in the SNMP PDU is an offset that points to the variable in error
- The _______ field in the SNMP PDU reports an error in a response message
- The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values
- We can divide audio and video services into _______ broad categories
- _______ audio/video refers to on-demand requests for compressed audio/video files
- __________ audio/video refers to the broadcasting of radio and TV programs through the Internet
- ________ audio/video refers to the use of the Internet for interactive audio/video applications
- According to the Nyquist theorem, we need to sample an analog signal ________times the highest frequency
- In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values
- _________ encoding is based on the science of psychoacoustics, which is the study of how people perceive sound
- ___________ is used to compress images
- ___________ is used to compress video
- The first phase of JPEG is ___________
- The second phase of JPEG is ___________
- The third phase of JPEG is ___________
- Jitter is introduced in real-time data by the _______________
- To prevent _________, we can timestamp the packets and separate the arrival time from the playback time
- A ________buffer is required for real-time traffic
- A __________on each packet is required for real-time traffic
- Real-time traffic needs the support of ____________
- _________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network
- _________ means combining several streams of traffic into one stream
- ________ is not suitable for interactive multimedia traffic because it retransmits packets in case of errors
- ________ is the protocol designed to handle real-time traffic on the Internet
- RTP uses a temporary even-numbered _______ port
- ___________ is a protocol for controlling the flow and quality of data
- RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP
- __________ is an application protocol that establishes, manages, and terminates a multimedia session
- ______ is a standard to allow telephones on the public telephone network to talk to computers connected to the Internet
- A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance
- A _______ shows the time a packet was produced relative to the first or previous packet
- ______ are used to number the packets of a real-time transmission
- In a real-time video conference, data from the server is _______ to the client sites
- A _______ adds signals from different sources to create a single signal
- A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal
- An RTP packet is encapsulated in _______
- When there is more than one source, the _______ identifier defines the mixer
- What is the port number of the HTTP ?
- What is the port number of the SMTP ?
- Using POP3, the e-mails are stored at
- To access e-mails from any machine and anywhere, we use
- SMTP is used to transfer
- Using IMAP, the e-mails are stored at
- What is the port number for (Post Office Protocol) POP3?
- Port number for ECHO?
- What is the port number for SSH Remote login service?
- PPP provides a protocol for bringing lines up, testing them, negotiating options, and bringing them down again gracefully when they are no longer needed. This protocol is known as:
- PPP handles
- What is the port number for (File Transfer Protocol - Control) FTP?
- Port number for (Secure Shell) SSH?
- The program that accepts the commands for composing, receiving and replying to messages, as well as for manipulating mail boxes is
- A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2-hours. The time required for the transfer is hours if synchronization is not provided
- What is the port number for (Trivial File Transfer Protocol) TFTP?
- What is the port number for Gopher services?
- To translate the message semantics from one format to other, ............... is used
- A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
- What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
- What protocol is used between E-Mail servers?
- Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
- What is the port number for POP3?
- Which of the following file retrieval methods use hypermedia?
- What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?
- Bulletin board system
- Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?
- To set up a bulletin board system you need
- The application layer of a network
- In Remote Logging, a user logs into a local timesharing system, it is called
- In File Transfer Protocol (FTP), while the control connection is open, the data connection can be opened and closed
- File Transfer Protocol (FTP), uses the same operation used by
- File Transfer Protocol (FTP), uses the well-known port 21 is used for the control connection and port 20 for the
- In the architecture of e-mail, we can have
- In File Transfer Protocol (FTP), a user needs an account (user name) and a password on the
- In EMAIL, We need two VAs and two pairs of MTAs, When the sender is connected to the mail server via
- Mail access starts with the client when the user needs to download e-mail from the
- TELNET is a general-purpose
- Example of command-driven user agents are
- When the sender and the receiver of an e-mail are on the same system, we need only two
- The command of End-of-File in the UNIX operating system is
- Most TELNET implementations operate in one of the modes
- An Email can have fields like, a number, a sender, size of the message and
- Examples of GUI based user agents are Eudora, netscape and
- In electronic mail, the MTA transfers the mail across the Internet via
- The well-known port used for FTP\'s control connection is
- MTA stands for
- FTP copies a file from
- The three modes of TELNET implementations are default mode, character mode and
- When the sender and the receiver of an e-mail are on different systems, we need two VAs and a pair of
- When the sender and the receiver of an e-mail are on the same system, we need only
- In File Transfer Protocol (FTP), the data connection is opened and then closed for each
- Post Office Protocol, version 3 (POP3), has two modes, Delete Mode and
- The FTP uses the services of
- NVT Stands for
- Post Office Protocol, version 3 (POP3) is simple and limited in
- At the beginning of the Internet era, the messages sent by electronic mail were short and consisted of
(b).two
need an explanation for this answer? contact us directly to get an explanation for this answer