Professional Documents
Culture Documents
7. Pick the odd one out. process or service you want to carry on.
a) File transfer
b) File download
c) E-mail
d) Interactive games 10. Which is a time-sensitive service?
a) File transfer
Answer: d b) File download
Explanation: File transfer, File download c) E-mail
and Email are services provided by the d) Internet telephony
application layer and there are
message and data oriented. Answer: d
Explanation: Internet telephony is Loss-
tolerant other applications are not.
Answer: a
Explanation: SMTP, abbreviation for
Simple Mail Transfer Protocol is an 18. Which one of the following is not an
application layer protocol. A client who application layer protocol?
wishes to send a mail creates a TCP a) media gateway protocol
connection to the SMTP server and then b) dynamic host configuration protocol
sends the mail across the connection. c) resource reservation protocol
d) session initiation protocol
Answer: c
Explanation: Resource reservation
24. The time taken by a packet to travel RTT to fetch a webpage from a server.
from client to server and then back to the
client is called __________
a) STT
b) RTT
c) PTT
27. The first line of HTTP request message
d) JTT
is called _____________
a) Request line
Answer: b
b) Header line
Explanation: RTT stands for round-trip
c) Status line
time.
d) Entity line
Answer: a
Explanation: The line followed by
25. The HTTP request message is sent in request line are called header lines and
_________ part of three-way handshake. status line is the initial part of response
a) First message.
b) Second
c) Third
d) Fourth
28. The values GET, POST, HEAD etc are
Answer: c
specified in ____________ of HTTP message
Explanation: In first step client sends a
a) Request line
segment to establish a connection with
b) Header line
the server. In the second the step the
c) Status line
client waits for the acknowledgement
d) Entity body
to be received from the server. After
receiving the acknowledgement, the
Answer: a
client sends actual data in the third
Explanation: It is specified in the
step.
method field of request line in the HTTP
request message.
a server. Those are GET and POST. In d) Web cache contains copies of recently
GET method, the client requests data requested objects
from server. In POST method the client
submits data to be processed to the Answer: a
server. Explanation: Web cache or also known
as HTTP cache is a temporary storage
where HTML pages and images are
stored temporarily so that server lag
30. The HTTP response message leaves could be reduced.
out the requested object when
____________ method is used
a) GET
b) POST 33. The conditional GET mechanism
c) HEAD a) Imposes conditions on the objects to
d) PUT be requested
b) Limits the number of response from a
Answer: c server
Explanation: HEAD method is much c) Helps to keep a cache upto date
faster than GET method. In HEAD d) None of the mentioned
method much smaller amount of data is
transferred. The HEAD method asks Answer: c
only for information about a document Explanation: The HTTP protocol
and not for the document itself. requests the server of the website its
trying to access so that it can store its
files, images etc. in cache memory. This
request of asking the server for a
31. Find the oddly matched HTTP status document considering a specific
codes parameter is called conditional GET
a) 200 OK Request.
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
34. Which of the following is present in
Answer: d both an HTTP request line and a status
Explanation: 404 Not Found. line?
a) HTTP version number
b) URL
c) Method
32. Which of the following is not correct? d) None of the mentioned
a) Web cache doesnt has its own disk
space Answer: a
b) Web cache can act both like server and Explanation: Status line is the the start
client line of an HTTP response. It contains
c) Web cache might reduce the response the information such as the protocol
time version, a status text, status code.
35. Multiple objects can be sent over a 38. HTTP client requests by establishing a
TCP connection between client and server __________ connection to a particular port
in a persistent HTTP connection. on the server.
a) True a) user datagram protocol
b) False b) transmission control protocol
c) border gateway protocol
Answer: a d) domain host control protocol
Explanation: Persistent connections are
kept active after completing transaction Answer: b
so that multiple objects can be sent Explanation: HTTP clients perform
over the same TCP connection. requests using a TCP connection,
because the TCP connection provides a
more reliable service. UDP is not a
reliable protocol, border gateway
36. HTTP is ________ protocol. protocol is used on top of TCP, while
a) application layer domain host control protocol is a
b) transport layer network layer protocol.
c) network layer
d) data link layer
46. FTP is built on _____ architecture. through port 20 and control connection
a) Client-server is done separately through port 21.
b) P2P
c) Data centric
d) Service oriented
49. If 5 files are transferred from server A
Answer: a to client B in the same session. The
Explanation: An FTP connection number of TCP connections between A
includes a Server and a Client which and B is _______
wish to share a number of data files. a) 5
The server can transfer files with b) 10
multiple clients at the same time while c) 2
the client communicates with only one d) 6
server at a time.
Answer: d
Explanation: The client would first
initiate the TCP control connection
47. FTP uses _________ parallel TCP through port 21. Then for every file
connections to transfer a file. transfer, a separate connection would
a) 1 be made through port 20. Now, since
b) 2 we have five files to be transferred, 1
c) 3 control connection + 5 data
d) 4 connections = 6 total TCP connections.
Answer: b
Explanation: Control connection using
FTP port: 21, and data connection using 50. FTP server _____________
FTP port: 20. The FTP session is started a) Maintains state information
or ended using port 21 and the actual b) Is stateless
data i.e. files are sent through port 20. c) Has single TCP connection for a file
transfer
d) Has UDP connection for file transfer
Answer: c
Explanation: FTP is out-of-band because
the data connection is done separately
51. The commands, from client to server, transforms/fragments the data into
and replies, from server to client, are sent segments, and then after the
across the control connection in ________ transmission is completed, converts it
bit ASCII format. back to stream of bytes.
a) 8
b) 7
c) 3
d) 5 54. The password is sent to the server
using ________ command.
Answer: b a) PASSWD
Explanation: FTP was designed to b) PASS
transmit commands only in English c) PASSWORD
characters that are possible with just 7 d) PWORD
bits in ASCII. Even the media has to be
converted to ASCII before transmission. Answer: b
Explanation: The PASS command,
preceded by the username, completes
the user’s identification for access
52. Find the FTP reply whose message is control in an FTP session. Without the
wrongly matched. valid password, the user won’t be able
a) 331 – Username OK, password required to initiate the FTP connection.
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection 55. When the mail server sends mail to
other mail servers it becomes
Answer: d ____________
Explanation: The correct response code a) SMTP server
for the message “Can’t open data b) SMTP client
connection” is 425. Response code 452 c) Peer
is sent usually when the connection is d) Master
suddenly closed.
Answer: b
Explanation: SMTP clients are the
entities that send mails to other mail
53. The data transfer mode of FTP, in servers. The SMTP servers cannot send
which all the fragmenting has to be done independent mails to other SMTP
by TCP is ________ servers as an SMTP server. There are no
a) Stream mode masters or peers in SMTP as it is based
b) Block mode on the client-server architecture.
c) Compressed mode
d) Message mode
a) Binary continually.
b) Signal
c) ASCII
d) Hash
59. The underlying Transport layer
Answer: c protocol used by SMTP is ________
Explanation: Since only 7-bit ASCII a) TCP
codes are transmitted through SMTP, it b) UDP
is mandatory to convert binary c) Either TCP or UDP
multimedia data to 7-bit ASCII before it d) IMAP
is sent using SMTP.
Answer: a
Explanation: TCP is a reliable protocol,
and Reliability is a mandatory
57. Expansion of SMTP is ________ requirement in e-mail transmission
a) Simple Mail Transfer Protocol using SMTP.
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
60. Choose the statement which is wrong
Answer: a incase of SMTP?
Explanation: SMTP or Simple Mail a) It requires message to be in 7bit ASCII
Transfer Protocol is an application layer format
protocol used to transport e-mails over b) It is a pull protocol
the Internet. Only 7-bit ASCII codes can c) It transfers files from one mail server to
be sent using SMTP. another mail server
d) SMTP is responsible for the
transmission of the mail through the
internet
58. In SMTP, the command to write
receiver’s mail address is written with the Answer: b
command _______ Explanation: In SMTP, the sending mail
a) SEND TO server pushes the mail to receiving mail
b) RCPT TO server hence it is push protocol. In a
c) MAIL TO pull protocol such as HTTP, the receiver
d) RCVR TO pulls the resource from the sending
server.
Answer: b
Explanation: RCPT TO command is
followed by the recipient’s mail address
to specify where or to whom the mail is 61. Internet mail places each object in
going to through the internet. If there is _________
more than one receiver, the command a) Separate messages for each object
is repeated for each address b) One message
c) Varies with number of objects
Answer: d
63. A session may include ________ Explanation: The sender’s User Agent
a) Zero or more SMTP transactions (UA) submits the message to a
b) Exactly one SMTP transactions Message Transfer Agent (MTA). Then
c) Always more than one SMTP the MTA sends the message to another
transactions MTA i.e. a mail relay. Then the receiver
d) Number of SMTP transactions cant be receives the message from the mail
determined relay whenever it is available.
Answer: a
Explanation: An SMTP session consists
of SMTP transactions only even if no 66. User agent does not support this
transactions have been performed. But ___________
no transactions in the session might a) Composing messages
mean that the session is inactive or is b) Reading messages
just initiated. c) Replying messages
d) Routing messages
Answer: d
64. Which of the following is an example Explanation: The user agent is basically
of user agents for e-mail? a software program that allows the user
Answer: d
Explanation: An SMTP session can only 76. SMTP is not used to deliver messages
include SMTP transactions regardless to ______
the number. Any other protocol’s a) user’s terminal
transaction is not included in an SMTP b) user’s mailbox
session. c) user’s word processor
d) user’s email client
Answer: c
74. SMTP defines _______ Explanation: SMTP can only be used to
a) message transport send messages to user’s terminal,
b) message encryption email client or mailbox. A stand-alone
c) message content word processor cannot be connected to
d) message password a network, so it won’t be possible to
deliver messages to it.
Answer: a
Explanation: As the name suggests,
Simple Mail Transfer Protocol is only 77. The entire hostname has a maximum
responsible for “how” the message is of ___________
transferred i.e. Transport of the a) 255 characters
message. Other protocols such as TCP b) 127 characters
are used to provide other services like c) 63 characters
encryption for the messages. d) 31 characters
Answer: a
Explanation: An entire hostname can
Answer: b Answer: a
Explanation: DNS client also known as Explanation: Root name servers are
DNS resolver also known as DNS lookup actually very important and critical as
helps to resolve DNS requests using an they are the first step in translating
external DNS server. human readable hostnames into IP
addresses for carrying out
communication.
Answer: c
Explanation: It need not be that a single
84. The right to use a domain name is hostname will correspond to a ip
delegated by domain name registers address. For example facebook.com
which are accredited by _______ and fb.com both correspond to same ip
a) internet architecture board address. So there can be multiple
b) internet society hostnames for a single ip address.
c) internet research task force
d) internet corporation for assigned
names and numbers 87. DHCP (dynamic host configuration
protocol) provides __________ to the client.
Answer: d a) IP address
Explanation: The ICANN (Internet b) MAC address
Corporation for Assigned Names and c) Url
Numbers) deals with IP address space d) None of the mentioned
allocation, protocol identifier
assignment, generic and country code Answer: a
Top Level domain name system Explanation: We use DHCP to allow the
management (gTLD and ccTLD). hosts to acquire their ip addresses
dynamically which is better than
visiting each and every host on the
network and configure all of this
85. The domain name system is information manually.
maintained by _______
a) distributed database system
b) a single server
c) a single computer 88. DHCP is used for ________
d) none of the mentioned a) IPv6
b) IPv4
Answer: a c) Both IPv6 and IPv4
Explanation: A domain name system is d) None of the mentioned
maintained by a distributed database
system. It is a collection of multiple, Answer: c
logically interrelated databases Explanation: DHCP is used for both IPv4
distributed over a computer network. and IPv6 addressing. With DHCP you
get to let the hosts know about the
Answer: b
Explanation: 67 is the UDP port number
89. The DHCP server _________ that is used as the destination port of a
a) maintains a database of available IP server. Whereas UDP port number 68 is
addresses used by the client.
b) maintains the information about client
configuration parameters
c) grants a IP address when receives a
request from a client 92. The DHCP server can provide the
d) all of the mentioned _______ of the IP addresses.
a) dynamic allocation
Answer: d b) automatic allocation
Explanation: Whenever a DHCP server c) static allocation
gets a request from a client it responds d) all of the mentioned
with a DHCP offer containing IP address
being offered, network mask offered, Answer: d
the amount of time that the client can Explanation: When a host acquires
use and keep it, the ip address of the multiple offers of IP addresses from
DHCP server making this offer. different DHCP servers, the host will
broadcast a dhcp request identifying
the server whose offer has been
accepted.
90. IP assigned for a client by DHCP
server is
a) for a limited period
b) for an unlimited period 93. DHCP client and servers on the same
c) not time dependent subnet communicate via _________
d) none of the mentioned a) UDP broadcast
b) UDP unicast
Answer: a c) TCP broadcast
Explanation: The IP address offered to a d) TCP unicast
client is only for a limited period of
time. There is actually a certain amount Answer: a
of time that the client can use and keep Explanation: DHCP actually employs a
this IP address. connectionless service, which is
provided by UDP, since TCP is
connection oriented. It is implemented
with two UDP port numbers 67 and 68
91. DHCP uses UDP port _________ for for its operations.
sending data to the server.
a) 66
b) 67
when a browser requests a webpage from sufficient, and this is possible without any
a remote server, assuming that the host TCP connection between Q and S
has just been restarted.