You are on page 1of 23

MCQs on Unit 1: Application layer Prococol

4. Application developer has permission


1. Which is not a application layer
to decide the following on transport layer
protocol?
side
a) HTTP
a) Transport layer protocol
b) SMTP
b) Maximum buffer size
c) FTP
c) Both Transport layer protocol and
d) TCP
Maximum buffer size
d) None of the mentioned
Answer: d
Explanation: TCP is transport layer
Answer: c
protocol.
Explanation: Application layer provides
the interface between applications and
the network. So application developer
can decide what transport layer to use
2. The packet of information at the
and what should be its maximum buffer
application layer is called __________
size.
a) Packet
b) Message
c) Segment
d) Frame
5. Application layer offers _______ service.
a) End to end
Answer: b
b) Process to process
Explanation: For Application,
c) Both End to end and Process to process
Presentation and Session layers there is
d) None of the mentioned
no data format for message. Message is
message as such in these three layers.
Answer: a
But when it comes to Transport,
Explanation: End to End service is
Network, Data and Physical layer they
provided in the application layer.
have data in format of segments,
Whereas process to process service is
packets, frames and bits respectively.
provided at the transport layer.

3. Which one of the following is an


architecture paradigms?
a) Peer to peer 6. E-mail is _________
b) Client-server a) Loss-tolerant application
c) HTTP b) Bandwidth-sensitive application
d) Both Peer-to-Peer & Client-Server c) Elastic application
d) None of the mentioned
Answer: d
Explanation: HTTP is a protocol. Answer: c
Explanation: Because it can work with
available throughput.

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

7. Pick the odd one out. process or service you want to carry on.
a) File transfer
b) File download
c) E-mail
d) Interactive games 10. Which is a time-sensitive service?
a) File transfer
Answer: d b) File download
Explanation: File transfer, File download c) E-mail
and Email are services provided by the d) Internet telephony
application layer and there are
message and data oriented. Answer: d
Explanation: Internet telephony is Loss-
tolerant other applications are not.

8. Which of the following is an application


layer service?
a) Network virtual terminal 11. Transport services available to
b) File transfer, access, and management applications in one or another form
c) Mail service _________
d) All of the mentioned a) Reliable data transfer
b) Timing
Answer: d c) Security
Explanation: The services provided by d) All of the mentioned
the application layer are network virtual
terminal, file transfer, access and Answer: d
management, mail services, directory Explanation: The transport services that
services, various file and data are provided to application are reliable
operations. data transfer, security and timing.
These are very important for proper
end to end services.

9. To deliver a message to the correct


application program running on a host,
the _______ address must be consulted. 12. Electronic mail uses which Application
a) IP layer protocol?
b) MAC a) SMTP
c) Port b) HTTP
d) None of the mentioned c) FTP
d) SIP
Answer: c
Explanation: IP address lets you know Answer: a
where the network is located. Whereas
MAC address is a unique address for
every device. Port address identifies a 13. The ____________ translates internet
domain and host names to IP address.

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

a) domain name system 16. The ASCII encoding of binary data is


b) routing information protocol called
c) network time protocol a) base 64 encoding
d) internet relay chat b) base 32 encoding
c) base 16 encoding
Answer: a d) base 8 encoding
Explanation: Domain name system is
the way the internet domain names are Answer: a
stored and translated to IP addresses. Explanation: Base64 is used commonly
The domain names systems matches in a number of applications including
the name of website to ip addresses of email via MIME, and storing complex
the website. data in XML. Problem with sending
normal binary data to a network is that
bits can be misinterpreted by
underlying protocols, produce incorrect
14. Which one of the following allows a data at receiving node and that is why
user at one site to establish a connection we use this code.
to another site and then pass keystrokes
from local host to remote host?
a) HTTP 17. Which one of the following is an
b) FTP internet standard protocol for managing
c) Telnet devices on IP network?
d) TCP a) dynamic host configuration protocol
b) simple network management protocol
Answer: c c) internet message access protocol
d) media gateway protocol

15. Which one of the following protocol Answer: b


delivers/stores mail to reciever server? Explanation: SNMP is a set of protocols
a) simple mail transfer protocol for network management and
b) post office protocol monitoring. This protocol is included in
c) internet mail access protocol the application layer. SNMP uses 7
d) hypertext transfer protocol protocol data units.

Answer: a
Explanation: SMTP, abbreviation for
Simple Mail Transfer Protocol is an 18. Which one of the following is not an
application layer protocol. A client who application layer protocol?
wishes to send a mail creates a TCP a) media gateway protocol
connection to the SMTP server and then b) dynamic host configuration protocol
sends the mail across the connection. c) resource reservation protocol
d) session initiation protocol

Answer: c
Explanation: Resource reservation

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

protocol is used in transport layer. It is d) TCP protocol


designed to reserve resources across a
network for quality of service using the Answer: a
integrated services model. Explanation: HTTP is abbreviation for
hypertext transfer protocol. It is the
foundation of data communication for
world wide web. This protocol decides
19. Which protocol is a signaling how the message is formatted and
communication protocol used for transmitted etc.
controlling multimedia communication
sessions?
a) session initiation protocol 22. The number of objects in a Web page
b) session modelling protocol which consists of 4 jpeg images and HTML
c) session maintenance protocol text is ________
d) resource reservation protocol a) 4
b) 1
Answer: a c) 5
Explanation: SIP is a signaling protocol d) 7
in which its function includes initiating,
maintaining and terminating real time Answer: c
sessions. SIP is used for signaling and
Explanation: 4 jpeg images + 1 base
controlling multimedia sessions.
HTML file.

20. Which one of the following is not


correct? 23. The default connection type used by
a) Application layer protocols are used by HTTP is _________
both source and destination devices a) Persistent
during a communication session b) Non-persistent
b) HTTP is a session layer protocol c) Can be either persistent or non-
c) TCP is an application layer protocol persistent depending on connection
d) All of the mentioned request
d) None of the mentioned
Answer: d
Explanation: HTTP is an application Answer: a
layer protocol. Whereas TCP is a Explanation: By default the http
transport layer protocol. connection is issued with persistent
connection. In persistent connection
server leaves connection open after
sending response. As little as one RTT
21. When displaying a web page, the (Time for a small packet to travel from
application layer uses the _____________ client to server and back) is required for
a) HTTP protocol all referenced objects.
b) FTP protocol
c) SMTP protocol

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

24. The time taken by a packet to travel RTT to fetch a webpage from a server.
from client to server and then back to the
client is called __________
a) STT
b) RTT
c) PTT
27. The first line of HTTP request message
d) JTT
is called _____________
a) Request line
Answer: b
b) Header line
Explanation: RTT stands for round-trip
c) Status line
time.
d) Entity line

Answer: a
Explanation: The line followed by
25. The HTTP request message is sent in request line are called header lines and
_________ part of three-way handshake. status line is the initial part of response
a) First message.
b) Second
c) Third
d) Fourth
28. The values GET, POST, HEAD etc are
Answer: c
specified in ____________ of HTTP message
Explanation: In first step client sends a
a) Request line
segment to establish a connection with
b) Header line
the server. In the second the step the
c) Status line
client waits for the acknowledgement
d) Entity body
to be received from the server. After
receiving the acknowledgement, the
Answer: a
client sends actual data in the third
Explanation: It is specified in the
step.
method field of request line in the HTTP
request message.

26. In the process of fetching a web page


from a server the HTTP request/response
29. The __________ method when used in
takes __________ RTTs.
the method field, leaves entity body
a) 2
empty.
b) 1
a) POST
c) 4
b) SEND
d) 3
c) GET
d) PUT
Answer: b
Explanation: By default the http
Answer: c
connection will be persistent
Explanation: There are two methods
connection. Hence it will take only 1
which help to request a response from

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

a server. Those are GET and POST. In d) Web cache contains copies of recently
GET method, the client requests data requested objects
from server. In POST method the client
submits data to be processed to the Answer: a
server. Explanation: Web cache or also known
as HTTP cache is a temporary storage
where HTML pages and images are
stored temporarily so that server lag
30. The HTTP response message leaves could be reduced.
out the requested object when
____________ method is used
a) GET
b) POST 33. The conditional GET mechanism
c) HEAD a) Imposes conditions on the objects to
d) PUT be requested
b) Limits the number of response from a
Answer: c server
Explanation: HEAD method is much c) Helps to keep a cache upto date
faster than GET method. In HEAD d) None of the mentioned
method much smaller amount of data is
transferred. The HEAD method asks Answer: c
only for information about a document Explanation: The HTTP protocol
and not for the document itself. requests the server of the website its
trying to access so that it can store its
files, images etc. in cache memory. This
request of asking the server for a
31. Find the oddly matched HTTP status document considering a specific
codes parameter is called conditional GET
a) 200 OK Request.
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
34. Which of the following is present in
Answer: d both an HTTP request line and a status
Explanation: 404 Not Found. line?
a) HTTP version number
b) URL
c) Method
32. Which of the following is not correct? d) None of the mentioned
a) Web cache doesnt has its own disk
space Answer: a
b) Web cache can act both like server and Explanation: Status line is the the start
client line of an HTTP response. It contains
c) Web cache might reduce the response the information such as the protocol
time version, a status text, status code.

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

35. Multiple objects can be sent over a 38. HTTP client requests by establishing a
TCP connection between client and server __________ connection to a particular port
in a persistent HTTP connection. on the server.
a) True a) user datagram protocol
b) False b) transmission control protocol
c) border gateway protocol
Answer: a d) domain host control protocol
Explanation: Persistent connections are
kept active after completing transaction Answer: b
so that multiple objects can be sent Explanation: HTTP clients perform
over the same TCP connection. requests using a TCP connection,
because the TCP connection provides a
more reliable service. UDP is not a
reliable protocol, border gateway
36. HTTP is ________ protocol. protocol is used on top of TCP, while
a) application layer domain host control protocol is a
b) transport layer network layer protocol.
c) network layer
d) data link layer

Answer: a 39. In HTTP pipelining ________________


Explanation: HTTP is an Application a) multiple HTTP requests are sent on a
layer protocol used to define how single TCP connection without waiting for
messages are formatted and the corresponding responses
transmitted through the World Wide b) multiple HTTP requests can not be sent
Web. on a single TCP connection
c) multiple HTTP requests are sent in a
queue on a single TCP connection
d) multiple HTTP requests are sent at
37. In the network HTTP resources are random on a single TCP connection
located by
a) uniform resource identifier Answer: a
b) unique resource locator Explanation: HTTP pipelining helps the
c) unique resource identifier client make multiple requests without
d) union resource locator having to waiting for each response,
thus saving a lot of time and bandwidth
Answer: a for the client.
Explanation: The Uniform Resource
Identifier is a name and locator for the
resource to be located by the HTTP. The
URLs and URNs are derived through the 40. FTP server listens for connection on
identifier. port number ____________
a) 20
b) 21
c) 22

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

d) 23 c) client server architecture


d) connection oriented architecture
Answer: b
Explanation: Port 20 is used for FTP Answer: c
data. Port 22 is used for SSH remote Explanation: The FTP connection
login. Port 23 is used for TELNET. includes a Server and a Client which
wish to share files. The server can have
multiple clients at the same time while
the client communicates with only one
41. In FTP protocol, client contacts server server at a time.
using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol 44. In File Transfer Protocol, data transfer
d) stream control transmission protocol cannot be done in ___________
a) stream mode
Answer: a b) block mode
Explanation: The clients use the c) compressed mode
Transmission Control Protocol for FTP as d) message mode
it’s more reliable than UDP, DCCP, and
SCTP, and reliability of file transfer is Answer: d
required to be as high as possible for Explanation: In Stream mode, the data
FTP. is transferred in a continuous stream. In
Block mode, data is transferred after
being divided into smaller blocks. In
Compressed mode, data is transferred
42. In Active mode FTP, the client initiates after being compressed using some
both the control and data connections. compression algorithm.
a) True
b) False
45. Expansion of FTP is __________
Answer: b a) Fine Transfer Protocol
Explanation: In Passive mode of FTP, b) File Transfer Protocol
the client initiates both data and c) First Transfer Protocol
control connections, while in Active d) Fast Transfer Protocol
mode, the client initiates the control
connection and then the server initiates Answer: b
the data connection. Explanation: File Transfer Protocol is an
application layer protocol used to share
“files” between a server and a client.
The protocol uses two separate ports
43. The File Transfer Protocol is built on for data and control connections: port
______________ 20 for data and port 21 for control.
a) data centric architecture
b) service oriented architecture

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

46. FTP is built on _____ architecture. through port 20 and control connection
a) Client-server is done separately through port 21.
b) P2P
c) Data centric
d) Service oriented
49. If 5 files are transferred from server A
Answer: a to client B in the same session. The
Explanation: An FTP connection number of TCP connections between A
includes a Server and a Client which and B is _______
wish to share a number of data files. a) 5
The server can transfer files with b) 10
multiple clients at the same time while c) 2
the client communicates with only one d) 6
server at a time.
Answer: d
Explanation: The client would first
initiate the TCP control connection
47. FTP uses _________ parallel TCP through port 21. Then for every file
connections to transfer a file. transfer, a separate connection would
a) 1 be made through port 20. Now, since
b) 2 we have five files to be transferred, 1
c) 3 control connection + 5 data
d) 4 connections = 6 total TCP connections.

Answer: b
Explanation: Control connection using
FTP port: 21, and data connection using 50. FTP server _____________
FTP port: 20. The FTP session is started a) Maintains state information
or ended using port 21 and the actual b) Is stateless
data i.e. files are sent through port 20. c) Has single TCP connection for a file
transfer
d) Has UDP connection for file transfer

48. Identify the incorrect statement Answer: a


regarding FTP. Explanation: FTP server maintains state
a) FTP stands for File Transfer Protocol information of every control connection
b) FTP uses two parallel TCP connections to keep track of the active and inactive
c) FTP sends its control information in- connections in the session. This helps
band the server decide which connection to
d) FTP sends exactly one file over the terminate, in case the connection is
data connection inactive for too long.

Answer: c
Explanation: FTP is out-of-band because
the data connection is done separately

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

51. The commands, from client to server, transforms/fragments the data into
and replies, from server to client, are sent segments, and then after the
across the control connection in ________ transmission is completed, converts it
bit ASCII format. back to stream of bytes.
a) 8
b) 7
c) 3
d) 5 54. The password is sent to the server
using ________ command.
Answer: b a) PASSWD
Explanation: FTP was designed to b) PASS
transmit commands only in English c) PASSWORD
characters that are possible with just 7 d) PWORD
bits in ASCII. Even the media has to be
converted to ASCII before transmission. Answer: b
Explanation: The PASS command,
preceded by the username, completes
the user’s identification for access
52. Find the FTP reply whose message is control in an FTP session. Without the
wrongly matched. valid password, the user won’t be able
a) 331 – Username OK, password required to initiate the FTP connection.
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection 55. When the mail server sends mail to
other mail servers it becomes
Answer: d ____________
Explanation: The correct response code a) SMTP server
for the message “Can’t open data b) SMTP client
connection” is 425. Response code 452 c) Peer
is sent usually when the connection is d) Master
suddenly closed.
Answer: b
Explanation: SMTP clients are the
entities that send mails to other mail
53. The data transfer mode of FTP, in servers. The SMTP servers cannot send
which all the fragmenting has to be done independent mails to other SMTP
by TCP is ________ servers as an SMTP server. There are no
a) Stream mode masters or peers in SMTP as it is based
b) Block mode on the client-server architecture.
c) Compressed mode
d) Message mode

Answer: a 56. If you have to send multimedia data


Explanation: Stream mode is the over SMTP it has to be encoded into
default mode of FTP, in which the TCP _______

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

a) Binary continually.
b) Signal
c) ASCII
d) Hash
59. The underlying Transport layer
Answer: c protocol used by SMTP is ________
Explanation: Since only 7-bit ASCII a) TCP
codes are transmitted through SMTP, it b) UDP
is mandatory to convert binary c) Either TCP or UDP
multimedia data to 7-bit ASCII before it d) IMAP
is sent using SMTP.
Answer: a
Explanation: TCP is a reliable protocol,
and Reliability is a mandatory
57. Expansion of SMTP is ________ requirement in e-mail transmission
a) Simple Mail Transfer Protocol using SMTP.
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
60. Choose the statement which is wrong
Answer: a incase of SMTP?
Explanation: SMTP or Simple Mail a) It requires message to be in 7bit ASCII
Transfer Protocol is an application layer format
protocol used to transport e-mails over b) It is a pull protocol
the Internet. Only 7-bit ASCII codes can c) It transfers files from one mail server to
be sent using SMTP. another mail server
d) SMTP is responsible for the
transmission of the mail through the
internet
58. In SMTP, the command to write
receiver’s mail address is written with the Answer: b
command _______ Explanation: In SMTP, the sending mail
a) SEND TO server pushes the mail to receiving mail
b) RCPT TO server hence it is push protocol. In a
c) MAIL TO pull protocol such as HTTP, the receiver
d) RCVR TO pulls the resource from the sending
server.
Answer: b
Explanation: RCPT TO command is
followed by the recipient’s mail address
to specify where or to whom the mail is 61. Internet mail places each object in
going to through the internet. If there is _________
more than one receiver, the command a) Separate messages for each object
is repeated for each address b) One message
c) Varies with number of objects

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

d) Multiple messages for each object a) Microsoft Outlook


b) Facebook
Answer: b c) Google
Explanation: It places all objects into d) Tumblr
one message as it wouldn’t be efficient
enough if there are different messages Answer: a
for each object. The objects include the Explanation: Among the options, only
text and all the multimedia to be sent. Microsoft Outlook is an e-mail agent.
Google is a search engine and
Facebook, and Tumblr are social
networking platforms. Gmail and Alpine
62. Typically the TCP port used by SMTP is are some other examples of e-mail
_________ agent.
a) 25
b) 35
c) 50
d) 15 65. When the sender and the receiver of
an email are on different systems, we
Answer: a need only _________
Explanation: The ports 15, 35 and 50 a) One MTA
are all UDP ports and SMTP only uses b) Two UAs
TCP port 25 for reliability. c) Two UAs and one MTA
d) Two UAs and two MTAs

Answer: d
63. A session may include ________ Explanation: The sender’s User Agent
a) Zero or more SMTP transactions (UA) submits the message to a
b) Exactly one SMTP transactions Message Transfer Agent (MTA). Then
c) Always more than one SMTP the MTA sends the message to another
transactions MTA i.e. a mail relay. Then the receiver
d) Number of SMTP transactions cant be receives the message from the mail
determined relay whenever it is available.

Answer: a
Explanation: An SMTP session consists
of SMTP transactions only even if no 66. User agent does not support this
transactions have been performed. But ___________
no transactions in the session might a) Composing messages
mean that the session is inactive or is b) Reading messages
just initiated. c) Replying messages
d) Routing messages

Answer: d
64. Which of the following is an example Explanation: The user agent is basically
of user agents for e-mail? a software program that allows the user

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

to send, and receive e-mail messages. d) 25


Routing of the message is done by the
Message Transfer Agent. Answer: d
Explanation: Port 21 is used for FTP
control connection, port 22 is used by
67. Simple mail transfer protocol (SMTP) SSH, and port 23 is used by TELNET.
utilizes _________ as the transport layer
protocol for electronic mail transfer.
a) TCP
b) UDP 70. Which one of the following protocol is
c) DCCP used to receive mail messages?
d) SCTP a) SMTP
b) Post Office Protocol (POP)
Answer: a c) Internet Message Access Protocol
Explanation: Since TCP is a reliable (IMAP)
protocol, it’s more efficient to use TCP d) FTP
protocol for e-mail transfer. TCP also
provides more security than other Answer: d
transport layer protocols. Explanation: FTP is used to share files.
SMTP, POP and IMAP are the protocols
used to send and receive mails on the
internet.
68. SMTP connections secured by SSL are
known as _____________
a) SMTPS
b) SSMTP 71. What is on-demand mail relay
c) SNMP (ODMR)?
d) STARTTLS a) protocol for SMTP security
b) an SMTP extension
Answer: a c) protocol for web pages
Explanation: SSMTP is a simple mail d) protocol for faster mail transfer
transfer program to send mail from a
local PC to a mail host. SNMP is a Answer: b
network management protocol. Explanation: ODMR is an extension to
STARTTLS connections are secured by SMTP, in which mails are relayed to the
TLS. receivers after they are authenticated.
It allows only the authorized receivers
to receive the mail.

69. SMTP uses which of the following TCP


port?
a) 22 72. An email client needs to know the
b) 23 _________ of its initial SMTP server.
c) 21 a) IP address
b) MAC address

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

c) URL 75. Which one of the following is an SMTP


d) Name server configured in such a way that
anyone on the internet can send e-mail
Answer: a through it?
Explanation: The client needs to know a) open mail relay
the IP of its initial SMTP server as it has b) wide mail reception
to send the mail first to that server and c) open mail reception
then the server forwards the mail d) short mail reception
ahead on behalf of the user.
Answer: a
Explanation: Anyone can send an e-
mail through an Open Mail Relay server
73. An SMTP session may not include so it acted like a free relay for email
_______ agents to forward their mails through.
a) zero SMTP transaction Open Mail Relays are now unpopular
b) one SMTP transaction because they can be used by attackers
c) more than one SMTP transaction to perform man-in-the-middle attacks.
d) one HTTP transaction

Answer: d
Explanation: An SMTP session can only 76. SMTP is not used to deliver messages
include SMTP transactions regardless to ______
the number. Any other protocol’s a) user’s terminal
transaction is not included in an SMTP b) user’s mailbox
session. c) user’s word processor
d) user’s email client

Answer: c
74. SMTP defines _______ Explanation: SMTP can only be used to
a) message transport send messages to user’s terminal,
b) message encryption email client or mailbox. A stand-alone
c) message content word processor cannot be connected to
d) message password a network, so it won’t be possible to
deliver messages to it.
Answer: a
Explanation: As the name suggests,
Simple Mail Transfer Protocol is only 77. The entire hostname has a maximum
responsible for “how” the message is of ___________
transferred i.e. Transport of the a) 255 characters
message. Other protocols such as TCP b) 127 characters
are used to provide other services like c) 63 characters
encryption for the messages. d) 31 characters

Answer: a
Explanation: An entire hostname can

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

have a maximum of 255 characters. only deals with mapping IP addresses


Although each label must be from 1 to with the hostname but also deals with
63 characters long. Host name is exchange of information in the server.
actually a label that is given to a device
in a network.

81. If a server has no clue about where to


find the address for a hostname then
78. A DNS client is called _________ _______
a) DNS updater a) server asks to the root server
b) DNS resolver b) server asks to its adjcent server
c) DNS handler c) request is not processed
d) none of the mentioned d) none of the mentioned

Answer: b Answer: a
Explanation: DNS client also known as Explanation: Root name servers are
DNS resolver also known as DNS lookup actually very important and critical as
helps to resolve DNS requests using an they are the first step in translating
external DNS server. human readable hostnames into IP
addresses for carrying out
communication.

79. Servers handle requests for other


domains _______
a) directly 82. Which one of the following allows
b) by contacting remote DNS server client to update their DNS entry as their
c) it is not possible IP address change?
d) none of the mentioned a) dynamic DNS
b) mail transfer agent
Answer: b c) authoritative name server
Explanation: Whenever a request is d) none of the mentioned
received at server from other domains,
it handles this situation by contacting Answer: a
remote DNS server. Explanation: Dynamic DNS or in short
DDNS or DynDNS helps in automatically
updating a name server in the DNS.
This does not require manual editing.
80. DNS database contains _______
a) name server records
b) hostname-to-address records
c) hostname aliases 83. Wildcard domain names start with
d) all of the mentioned label _______
a) @
Answer: d b) *
Explanation: Domain Name system not c) &

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

d) # 86. Which one of the following is not true?


a) multiple hostnames may correspond to
Answer: b a single IP address
Explanation: A wildcard DNS record b) a single hostname may correspond to
matches requests to a non existent many IP addresses
domain name. This wildcard DNS record c) a single hostname may correspond to a
is specified by using asterisk “*” as the single IP address
starting of a domain name. d) none of the mentioned

Answer: c
Explanation: It need not be that a single
84. The right to use a domain name is hostname will correspond to a ip
delegated by domain name registers address. For example facebook.com
which are accredited by _______ and fb.com both correspond to same ip
a) internet architecture board address. So there can be multiple
b) internet society hostnames for a single ip address.
c) internet research task force
d) internet corporation for assigned
names and numbers 87. DHCP (dynamic host configuration
protocol) provides __________ to the client.
Answer: d a) IP address
Explanation: The ICANN (Internet b) MAC address
Corporation for Assigned Names and c) Url
Numbers) deals with IP address space d) None of the mentioned
allocation, protocol identifier
assignment, generic and country code Answer: a
Top Level domain name system Explanation: We use DHCP to allow the
management (gTLD and ccTLD). hosts to acquire their ip addresses
dynamically which is better than
visiting each and every host on the
network and configure all of this
85. The domain name system is information manually.
maintained by _______
a) distributed database system
b) a single server
c) a single computer 88. DHCP is used for ________
d) none of the mentioned a) IPv6
b) IPv4
Answer: a c) Both IPv6 and IPv4
Explanation: A domain name system is d) None of the mentioned
maintained by a distributed database
system. It is a collection of multiple, Answer: c
logically interrelated databases Explanation: DHCP is used for both IPv4
distributed over a computer network. and IPv6 addressing. With DHCP you
get to let the hosts know about the

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

change dynamically, and hosts update c) 68


their info themselves. d) 69

Answer: b
Explanation: 67 is the UDP port number
89. The DHCP server _________ that is used as the destination port of a
a) maintains a database of available IP server. Whereas UDP port number 68 is
addresses used by the client.
b) maintains the information about client
configuration parameters
c) grants a IP address when receives a
request from a client 92. The DHCP server can provide the
d) all of the mentioned _______ of the IP addresses.
a) dynamic allocation
Answer: d b) automatic allocation
Explanation: Whenever a DHCP server c) static allocation
gets a request from a client it responds d) all of the mentioned
with a DHCP offer containing IP address
being offered, network mask offered, Answer: d
the amount of time that the client can Explanation: When a host acquires
use and keep it, the ip address of the multiple offers of IP addresses from
DHCP server making this offer. different DHCP servers, the host will
broadcast a dhcp request identifying
the server whose offer has been
accepted.
90. IP assigned for a client by DHCP
server is
a) for a limited period
b) for an unlimited period 93. DHCP client and servers on the same
c) not time dependent subnet communicate via _________
d) none of the mentioned a) UDP broadcast
b) UDP unicast
Answer: a c) TCP broadcast
Explanation: The IP address offered to a d) TCP unicast
client is only for a limited period of
time. There is actually a certain amount Answer: a
of time that the client can use and keep Explanation: DHCP actually employs a
this IP address. connectionless service, which is
provided by UDP, since TCP is
connection oriented. It is implemented
with two UDP port numbers 67 and 68
91. DHCP uses UDP port _________ for for its operations.
sending data to the server.
a) 66
b) 67

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

94. After obtaining the IP address, to addresses being offered by


prevent the IP conflict the client may use unauthorized servers. This features
_________ allows only specific mac addresses and
a) internet relay chat IP addresses to access the network
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned 97. The application layer protocol used by
a Telnet application is ________
Answer: c a) Telnet
Explanation: ARP abbreviation for b) FTP
address resolution protocol is used for c) HTTP
mapping IP addresses to MAC d) SMTP
addresses that are present in the local
network. Answer: a
Explanation: Telnet is an application
layer protocol that provides access to
the command-line interface on a
95. What is DHCP snooping? remote host. Telnet stands for teletype
a) techniques applied to ensure the network.
security of an existing DHCP
infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP 98. Which amongst the following
d) none of the mentioned statements is correct for “character at a
time” mode?
Answer: a a) Character processing is done on the
Explanation: DHCP snooping is a local system under the control of the
security feature that is used in OS of a remote system
network in the layer 2. This technology b) Most text typed is immediately sent to
prevents unauthorized DHCP servers the remote host for processing
offering IP addresses to DHCP clients. c) All text is echoed locally, only
completed lines are sent to the remote
host
d) All text is processed locally, and only
96. If DHCP snooping is configured on a confirmed lines are sent to the remote
LAN switch, then clients having specific host
______ can access the network.
a) MAC address Answer: b
b) IP address Explanation: In character at a time
c) Both MAC address and IP address mode, the typed text is sent
d) None of the mentioned immediately to the remote host while
the user is typing. Another mode used
Answer: c in Telnet is “Old line by line” mode in
Explanation: The DHCP snooping is which only completed lines are sent to
done to prevent unauthorized IP

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

the remote host. Answer: c


Explanation: Telnet is an application
layer protocol that provides access to
the command line interface of a remote
99. _______ allows you to connect and computer that can be used to perform
login to a remote computer remote
a) Telnet
b) FTP
c) HTTP 102. Which one of the following is not
d) SMTP correct?
a) telnet is a general purpose client-
Answer: a server program
Explanation: Telnet provides access to b) telnet lets user access an application
the command-line interface on a on a remote computer
remote computer. One can login to the c) telnet can also be used for file transfer
computer from the command-line d) telnet can be used for remote login
interface.
Answer: c
Explanation: File Transfer Protocol is
used for file transfer. Telnet provides
100. What is the correct syntax to be access to the command-line interface
written in the web browser to initiate a on a remote host.
Telnet connection to
www.sanfoundry.com?
a) telnet//www.sanfoundry.com
b) telnet:www.sanfoundry.com 103. Which operating mode of telnet is
c) telnet://www.sanfoundry.com full duplex?
d) telnet www.sanfoundry.com a) default mode
b) server mode
Answer: c c) line mode
Explanation: telnet://” is the header to d) character mode
be used to initiate a Telnet connection
to a web server. One can browse the Answer: c
website using telnet if they are Explanation: In line mode, terminal
authorized to. character processing is done on the
client side but editing is enabled on the
server side. Line mode reduces the
number of packets and is useful for
101. Telnet is used for _______ long delay networks.
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site 104. If we want that a character be
interpreted by the client instead of server
_________

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

a) interpret as command (IAC) escape Answer: d


character has to be used Explanation: The client can use the NVT
b) control functions has to be disabled only to interact with the programs
c) it is not possible already present on the remote server,
d) cli character has to be used not to transfer files to it. To transfer
files, an FTP connection has to be used.
Answer: a
Explanation: The client must look at
each byte that arrives and look for IAC
escape character. If IAC is found, the 107. All telnet operations are sent as
client moves on to look for any other ________
code or IAC. If the next byte is IAC – a a) 4 bits
single byte is presented by the client to b) 8 bits
the terminal. If IAC is followed by any c) 16 bits
other code than IAC, the client d) 32 bits
interprets this as a command.
Answer: b
Explanation: Telnet provides a bi-
105. Telnet protocol is used to establish a directional, 8-bit byte oriented
connection to __________ communications facility through which
a) TCP port number 21 operations are sent as 8-bit bytes for
b) TCP port number 22 the server to interpret.
c) TCP port number 23
d) TCP port number 25

Answer: c 108. AbsoluteTelnet is a telnet client for


Explanation: TCP port 21 is used for _______ Operating system.
FTP, TCP port 22 is used for SSH and a) windows
TCP port 25 is used for SMTP. Telnet b) linux
provides access to a command line c) mac
interface on a remote computer using d) ubuntu
the TCP port number 23.
Answer: a
Explanation: AbsoluteTelnet was
originally released in 1999. It was
106. Which one of the following is not developed by Brian Pence of Celestial
true? Software.
a) telnet defines a network virtual
terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations 109. The decimal code of Interpret as
d) client can transfer files using to remote Command (IAC) character is _______
server using NVT a) 252
b) 253
c) 254

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

d) 255 typed by the user to the server, thus


saving the amount of packet
Answer: d transmissions required for executing
Explanation: If we want that a character each operation. But the server has to
be interpreted by the client instead of remain idle until the client sends the
server, we use the IAC character. If IAC completed line wasting a lot of time.
is followed by any other code than IAC,
the client interprets it as a character.

112. Which one of the following is not


correct?
110. Which of the following is true for a) telnet is a general purpose client-
character mode operation of telnet server program
implementation? b) telnet lets user access an application
a) each character typed is sent by the on a remote computer
client to the server c) telnet can also be used for file transfer
b) each character typed is discarded by d) telnet can be used for remote login
the server
c) each character typed is aggregated Answer: c
into a word and then sent to the server Explanation: File Transfer Protocol is
d) each character type is aggregated into used for file transfer. Telnet provides
a line and then sent to the server access to the command-line interface
on a remote host.
Answer: a
Explanation: In character mode, each
character that the user is typing is
immediately sent to the server which 113. POP stands for __________.
then interprets it only after the A. Post office Protocol
complete operation command is B. Post office Protoco
received. C. Post Operating Protocol
D. Pre Operating Protocol
Correct Answer : OPTION A, POP stands
for Post Office Protocol.
111. In which mode of telnet, the client 114. IMAP stands for __________.
echoes the character on the screen but
A. Internet Message Accessing Process
does not send it until a whole line is
B. Internet Message Accessing Process
completed? C. Internet Message Access Protocol
a) default mode D. None of the Above
b) character mode Correct Answer : OPTION C, IMAP stands
c) server mode for Internet Message Access Protocol.
d) command mode
115. Post office protocol works on
Answer: a __________.
Explanation: In the default mode, the
A. Network layer
client does not send each character
B. Application layer

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

C. Transport layer 120. Which one of the following protocols


D. Physical layer is used to fetch mail from the mail box?
Correct Answer : OPTION B, Post office
A. POP3
protocol works on the application layer. B. IMAP
C. SMTP
D. None of these
116. Internet message access protocol Correct Answer : OPTION A, POP3 is used
works on __________.
to fetch mail from the mail box.
A. Transport layer B. Network layer
C. Application layer D. Session layer
Correct Answer : OPTION C, Internet 121. Post Office Protocol is a __________.
Message Access Protocol IMAP works on A. Connection less protocol.
the application layer. B. Connection oriented protocol
C. Stateless protocol
117. The Post office protocol uses port D. None of the above
number ____. Correct Answer : OPTION B, Post office
protocol is a connection oriented
A. 100
B. 110 protocol.
C. 120
D. 130 123. IMAP is a __________.
Correct Answer : OPTION B, The Post
A. Connection less B. Connection oriented
Office Protocol uses port number 110. protocol protocol
C. Stateless protocol D. None of the above
Correct Answer : OPTION B, Internet
118. Post Office Protocol uses __________?
Message Access Protocol is a connection
A. Persistent TCP connections oriented protocol.
B. Non-persistent connection
C. Stateless Protocol
D. Connection less protocol 124. MIME stands for __________.
Correct Answer : OPTION A, Post Office
A. Multipurpose Internet B. Multimedia Internet
Protocol uses persistent TCP connections.
Mail Extension Mail Extension
C. Message Internet Mail D. Message Internet
Email Mail Extension
119. Internet Message Access Protocol
Correct Answer : OPTION A, MIME stands
uses port number ____.
for Multipurpose Internet Mail Extension
A. 140
and used in network.
B. 141
C. 142
D. 143 125. Which of the following protocol pairs
Correct Answer : OPTION D, Internet can be used to send and retrieve e-mails
(in that order)?
Message Access Protocol uses port
Answer : (B) SMTP, POP3
number 143.
126. Identify the correct sequence in
which the following packets are
transmitted on the network by a host

Subject : Computer network security SEM I


MCQs on Unit 1: Application layer Prococol

when a browser requests a webpage from sufficient, and this is possible without any
a remote server, assuming that the host TCP connection between Q and S
has just been restarted.

a)HTTP GET request, DNS query, TCP SYN


b) DNS query, HTTP GET request, TCP SYN
c) DNS query, TCP SYN, HTTP GET request
d) TCP SYN, DNS query, HTTP GET request

127. In one of the pairs of protocols given


below, both the protocols can use
multiple TCP connections between the
same client and the server. Which one is
that?
(A) HTTP, FTP
(B) HTTP, TELNET
(C) FTP, SMTP
(D) HTTP, SMTP

128. A graphical HTML browser resident


at a network client machine Q accesses a
static HTML webpage from a HTTP
server S. The static HTML page has
exactly one static embedded image which
is also at S. Assuming no caching, which
one of the following is correct about the
HTML webpage loading (including the
embedded image)?
(A)Q needs to send at least 2 HTTP
requests to S, each necessarily in a
separate TCP connection to server S
(B) Q needs to send at least 2 HTTP
requests to S, but a single TCP
connection to server S is sufficient
c) Q to S is sufficient, and a single TCP
connection between Q and S is necessary
for this

(D)A single HTTP request fromQ to S is

Subject : Computer network security SEM I

You might also like