The document covers various aspects of the application layer in networking, including its role, protocols, and services such as HTTP, DNS, and email. It discusses client-server and peer-to-peer paradigms, socket programming, and the advantages of persistent connections. Additionally, it highlights improvements in HTTP/2 and HTTP/3, the importance of caching, and security concerns related to dynamic DNS updates.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
25 views12 pages
Ch2 Computer Networks - GPT
The document covers various aspects of the application layer in networking, including its role, protocols, and services such as HTTP, DNS, and email. It discusses client-server and peer-to-peer paradigms, socket programming, and the advantages of persistent connections. Additionally, it highlights improvements in HTTP/2 and HTTP/3, the importance of caching, and security concerns related to dynamic DNS updates.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12
1.
Role of the Application Layer
Which statement best describes the primary function of the application layer? A. It encapsulates data into frames for transmission over the physical medium. B. It acts as an interface between the user (or application) and the network, managing protocols that present data to the user. C. It routes data packets across different networks. D. It provides error detection and correction on a hop-by-hop basis. Answer: B 2. Network Applications Overview Which of the following is NOT typically considered an application-layer service? A. Web browsing B. Email communication C. Routing between autonomous systems D. Peer-to-peer file sharing Answer: C 3. Client-Server Paradigm In the client-server model, which characteristic is most accurate? A. Clients typically have permanent IP addresses and always remain connected. B. Servers are always-on hosts with permanent IP addresses, while clients can have dynamic addresses and intermittent connections. C. Both clients and servers communicate directly without intermediaries. D. All processes act simultaneously as clients and servers in every transaction. Answer: B 4. Peer-to-Peer Paradigm What is a defining characteristic of the peer-to-peer (P2P) paradigm? A. A centralized server always mediates communication between endpoints. B. All participating nodes (peers) are required to be permanently connected. C. Peers directly communicate with each other, with no single central server managing requests. D. P2P networks can only be used for file sharing. Answer: C 5. Sockets and Process Communication Which statement best describes a socket in network programming? A. A physical port on a router. B. An endpoint for communication between two processes running on the same or different hosts, identified by an IP address and a port number. C. A protocol used for encryption at the application layer. D. A temporary storage location for data packets awaiting transmission. Answer: B 6. Port Numbers What is the primary purpose of port numbers in socket addressing? A. To uniquely identify a host on the Internet. B. To determine the physical connection speed. C. To differentiate between multiple processes running on the same host. D. To specify the security level of a connection. Answer: C 7. HTTP Protocol Which application-layer protocol is most commonly used for retrieving web pages? A. SMTP B. FTP C. HTTP D. DNS Answer: C 8. HTTP Connection Management What feature of HTTP/1.1 allows multiple objects to be transferred over a single TCP connection? A. Non-persistent connections B. Persistent connections (keep-alive) C. UDP encapsulation D. Stateless communication Answer: B 9. Web Caching What is the primary benefit of using a web cache (proxy server)? A. It increases the load on the origin server by duplicating requests. B. It reduces network traffic and improves response time by serving frequently requested objects from a location closer to the client. C. It ensures that all HTTP messages are encrypted. D. It eliminates the need for DNS resolution. Answer: B 10. Cookies and State Maintenance How do HTTP cookies help maintain state in an otherwise stateless protocol? A. By storing encryption keys for each session B. By preserving state information across multiple HTTP transactions through client-side storage and subsequent inclusion in HTTP requests C. By establishing persistent TCP connections D. By caching entire web pages on the server Answer: B 11. DNS Fundamentals What is the primary purpose of the Domain Name System (DNS)? A. To translate human-readable domain names into IP addresses and vice versa B. To manage the allocation of IP addresses C. To cache web pages for faster access D. To encrypt data transmitted over the Internet Answer: A 12. DNS Query Types Which DNS query type delegates the full resolution process to the contacted name server, thereby placing the burden of recursion on that server? A. Iterative query B. Recursive query C. CNAME query D. MX query Answer: B 13. DNS Records Which type of DNS record is used to associate a domain name with its corresponding IPv4 address? A. NS record B. A record C. MX record D. CNAME record Answer: B 14. Mail Protocols Which protocol is primarily used for delivering email messages between mail servers? A. POP3 B. IMAP C. SMTP D. HTTP Answer: C 15. Email Retrieval Which protocol is commonly used for retrieving and managing email messages stored on a mail server? A. SMTP B. IMAP C. FTP D. Telnet Answer: B 16. TCP vs. UDP in Socket Programming What is the main difference between TCP and UDP in the context of socket programming? A. TCP is connectionless, whereas UDP is connection-oriented. B. TCP provides reliable, ordered delivery of data, while UDP offers faster, but unreliable, datagram transmission. C. UDP supports flow control and congestion control, whereas TCP does not. D. UDP is used only for email applications. Answer: B 17. Adaptive Streaming (DASH) What is the primary objective of Dynamic Adaptive Streaming over HTTP (DASH) in multimedia applications? A. To provide a constant bit rate regardless of network conditions B. To allow the streaming client to dynamically select video chunks encoded at different quality levels based on current available bandwidth C. To encrypt video content during transmission D. To establish multiple simultaneous TCP connections for faster delivery Answer: B 18. HTTP/2 Improvements Which of the following is a key feature of HTTP/2 that improves upon HTTP/1.1? A. It eliminates the need for TCP connections. B. It introduces multiplexing, allowing multiple streams of data to be interleaved over a single connection, thereby reducing head-of-line blocking. C. It requires a new set of status codes that are incompatible with HTTP/1.1. D. It removes persistent connections in favor of non-persistent ones. Answer: B 19. HTTP/3 Characteristics Which statement about HTTP/3 is correct? A. HTTP/3 is built on TCP and focuses solely on backward compatibility. B. HTTP/3 is built on UDP (using QUIC) and offers improved performance with reduced latency and enhanced security features. C. HTTP/3 eliminates the need for header compression. D. HTTP/3 does not support multiplexing. Answer: B 20. P2P File Distribution In BitTorrent’s tit-for-tat mechanism, what is the primary purpose of this strategy? A. To maximize download speed by preferentially exchanging data with peers that provide higher upload rates B. To ensure that all peers upload data equally regardless of their performance C. To encrypt file chunks during transfer D. To designate a central server that manages all file exchanges Answer: A 21. Role of Trackers in P2P Networks What is the primary function of a tracker in a BitTorrent network? A. To host the entire file for download B. To keep a list of peers participating in the torrent and help new peers discover other peers C. To enforce digital rights management (DRM) on shared files D. To compress file chunks before distribution Answer: B 22. Overall Application Layer Perspective Which of the following statements best summarizes the role of the application layer? A. It is responsible for routing data across different networks using IP addresses. B. It provides the interface and protocols that allow user-level applications to interact with the network, supporting diverse services such as web browsing, email, file sharing, and video streaming. C. It ensures that data is transmitted over the physical medium without error. D. It manages the flow of data between routers in the network core.
Answer: B
23. HTTP Methods and Their Purposes
Which HTTP method is best suited for submitting data to a server for processing (such as form data)? A. GET B. POST C. HEAD D. OPTIONS Answer: B 24. Persistent vs. Non-Persistent HTTP What is the primary advantage of persistent HTTP connections over non-persistent connections? A. They require a new TCP handshake for every object transfer. B. They reduce latency by reusing an already established TCP connection for multiple HTTP requests. C. They enforce encryption on all transferred data. D. They mandate that each HTTP message is sent as a separate packet. Answer: B 25. HTTP Status Codes In an HTTP response, which component of the message is used to indicate whether a request succeeded or failed? A. The request line B. The status line C. The header fields D. The message body Answer: B 26. Cookie Mechanisms How do cookies primarily help maintain state across HTTP transactions? A. By storing session information on the server exclusively B. By embedding a unique identifier in subsequent HTTP requests from the client C. By encrypting the entire HTTP message D. By initiating a persistent TCP connection Answer: B 27. DNS Resolution Strategies Which DNS query type offloads the entire name resolution process to the queried DNS server? A. Iterative query B. Recursive query C. Broadcast query D. Multicast query Answer: B 28. DNS Caching Benefits What is the main benefit of caching DNS query results at local name servers? A. It increases the load on root DNS servers. B. It eliminates the need for iterative queries entirely. C. It reduces resolution latency and overall network traffic. D. It mandates that all DNS records are updated in real time. Answer: C 29. Web Caching and Performance How does a proxy cache improve web performance for clients? A. By encrypting HTTP messages before sending them B. By storing frequently requested web objects closer to the client, reducing access delay C. By replacing the origin server entirely D. By eliminating the need for DNS lookups Answer: B 30. Conditional GET in HTTP The "If-Modified-Since" header in an HTTP GET request is used to: A. Ensure that a new copy of the object is always downloaded B. Allow the client to receive a 304 Not Modified response when the cached copy is current C. Force the server to revalidate the client's TCP connection D. Indicate that the object should be compressed during transmission Answer: B 31. HTTP/2 Improvements Which of the following features is a key improvement of HTTP/2 over HTTP/1.1? A. Use of multiple simultaneous TCP connections per request B. Multiplexing multiple streams over a single TCP connection C. Dropping all header fields for faster processing D. Replacing TCP with UDP for all data transfers Answer: B 32. HTTP/3 Distinctions How does HTTP/3 primarily differ from HTTP/2? A. It uses TCP to ensure reliability. B. It uses UDP (via QUIC) to reduce latency and mitigate head-of-line blocking. C. It removes support for server push. D. It does not support multiplexing. Answer: B 33. Email Protocol Functions Which protocol is used for reliably transferring email messages between mail servers? A. POP3 B. IMAP C. SMTP D. HTTP Answer: C 34. Email Retrieval Protocols When a user wishes to view their email without downloading it permanently, which protocol is most suitable? A. SMTP B. IMAP C. FTP D. SNMP Answer: B 35. Socket Programming Essentials In TCP socket programming, what is required to establish a connection between a client and a server? A. The client must bind to a fixed port number identical to the server’s port. B. The server must be actively listening on a well-known port while the client initiates a connection to that port. C. Both client and server must use UDP sockets. D. The client must first send an HTTP request before connecting. Answer: B 36. Peer-to-Peer (P2P) Architectures What is a primary advantage of a P2P architecture compared to a traditional client-server model? A. It centralizes control in a single server. B. It allows for self-scalability as each new peer contributes resources for both downloading and uploading. C. It guarantees higher security through central monitoring. D. It always provides faster data transfer than client-server. Answer: B 37. Role of Trackers in BitTorrent In a BitTorrent network, what is the role of the tracker? A. It stores the entire file to be shared among peers. B. It maintains a list of peers participating in the file distribution, enabling peers to find each other. C. It encrypts the file chunks for secure distribution. D. It prioritizes file chunks for faster download. Answer: B 38. CDNs and Content Distribution How do Content Distribution Networks (CDNs) enhance the delivery of video content? A. By storing copies of content at distributed nodes closer to end users, reducing latency and load on origin servers B. By replacing the need for adaptive streaming protocols C. By centralizing all content at a single data center D. By encrypting content with proprietary algorithms Answer: A 39. Adaptive Streaming (DASH) What is the main benefit of DASH (Dynamic Adaptive Streaming over HTTP) for video streaming applications? A. It locks the video quality to a constant bit rate regardless of network conditions. B. It allows the client to dynamically adjust the video quality based on real-time network bandwidth, reducing buffering. C. It eliminates the need for TCP connections. D. It compresses video files into a single stream without fragmentation. Answer: B 40. DNS Record Types Which DNS record type is used for mapping a domain name to an IPv4 address? A. NS record B. MX record C. A record D. CNAME record Answer: C 41. DNS Hierarchical Structure What is a key reason for the hierarchical design of the DNS system? A. To allow any single server to handle all queries worldwide. B. To distribute the load and provide fault tolerance, preventing a single point of failure. C. To enforce a centralized control over domain names. D. To ensure that DNS queries are always resolved within the local network. Answer: B 42. Application Layer Overall Perspective Which statement best summarizes the role of the application layer in the network stack? A. It is responsible for physical data transmission between devices. B. It provides the interface and protocols that enable user-level applications (such as web browsing, email, file sharing, and streaming) to interact with the network. C. It manages routing and forwarding of packets across different networks. D. It primarily handles error correction and retransmission of lost packets. Answer: B 43. Persistent HTTP Challenges In high-latency networks, one significant challenge with persistent HTTP connections is: A. The inability to reuse TCP connections for multiple requests. B. Increased risk of head-of-line blocking delaying all subsequent HTTP responses. C. Mandatory encryption overhead on every connection. D. Frequent re-establishment of TCP handshakes. Answer: B 44. HTTP/2 Header Compression (HPACK) Which statement best characterizes HPACK, the header compression mechanism in HTTP/2? A. It compresses headers using a static dictionary only, without dynamic updates. B. It uses both static and dynamic tables to reduce redundant header information, though it may be vulnerable to compression-based attacks. C. It eliminates all header fields to minimize latency. D. It relies solely on transport-layer encryption for header security. Answer: B 45. Dynamic DNS Updates Security Concerning dynamic DNS updates as per RFC 2136, what is the primary security risk if proper authentication is not enforced? A. Unauthorized clients might inject fraudulent records, leading to DNS hijacking or cache poisoning. B. Excessive DNS query traffic leading to denial-of-service on the local server. C. Loss of the hierarchical structure of DNS zones. D. Inability to resolve domain names due to TTL mismanagement. Answer: A 46. P2P Churn Effects In a BitTorrent-like system, a high peer churn rate (frequent joining and leaving) can primarily lead to: A. Increased overall system throughput as more peers contribute. B. Reduced file availability and degraded download speeds due to an unstable peer set. C. A complete elimination of tit-for-tat incentives. D. No observable effect if the tracker is highly available. Answer: B 47. DNSSEC Tradeoffs How does DNSSEC mitigate DNS poisoning, and what is a primary limitation of its deployment? A. It encrypts DNS responses to prevent tampering, but the encryption overhead significantly slows down resolution. B. It digitally signs DNS records to ensure authenticity; however, increased message sizes can lead to fragmentation and performance issues. C. It centralizes DNS resolution to trusted servers, but this introduces a single point of failure. D. It caches DNS responses longer to ensure stability, which can cause outdated records to persist. Answer: B 48. Live Video CDN Challenges Compared to on-demand streaming, a major design challenge for CDNs delivering live video is: A. Handling a large number of simultaneous file transfers. B. Ensuring real-time synchronization and low latency across geographically dispersed nodes. C. Storing large libraries of video content on every edge server. D. Reliably delivering static web pages along with dynamic content. Answer: B 49. Adaptive Bitrate Decision Making In DASH, the client chooses the video quality based primarily on: A. The maximum encoding rate available on the server. B. A pre-configured default setting that remains unchanged during a session. C. Real-time measurements of available bandwidth and buffer occupancy to select the optimal bitrate. D. The number of peers currently streaming the video. Answer: C 50. HTTP/2 Server Push Mechanism Which of the following correctly describes the server push feature in HTTP/2, and what is a potential drawback? A. The server push proactively sends unsolicited resources to the client, which can waste bandwidth if the client does not need them. B. Server push requires a new TCP connection for every resource, increasing overhead. C. It forces the client to cache all pushed resources indefinitely. D. It eliminates the need for client-initiated requests, which may overwhelm the client. Answer: A 51. Conditional GET Efficiency A conditional GET (using the "If-Modified-Since" header) primarily reduces network traffic by: A. Forcing the server to always send the full object for validation. B. Allowing the client to receive a minimal 304 Not Modified response when the cached version is up-to-date, thereby avoiding full object transmission. C. Compressing the response on the fly before transmission. D. Caching the entire HTTP conversation at the client side. Answer: B 52. TCP Pipelining Impact In HTTP/1.1, pipelining can suffer from head-of-line blocking due to TCP's behavior. This is because: A. Each HTTP request must complete before the next one is sent. B. Loss or delay in one TCP segment can delay all subsequent segments in the pipeline, even if they are independent. C. Multiple TCP connections are used simultaneously, causing congestion. D. It forces the client to re-establish connections for every object. Answer: B 53. UDP vs. TCP Considerations When an application uses both UDP and TCP concurrently, which inherent difference must be taken into account? A. UDP’s inherent connection-orientation compared to TCP’s statelessness. B. TCP guarantees reliability and order, while UDP may deliver packets out-of-order or drop them, requiring the application to handle such issues if needed. C. UDP provides built-in congestion control, whereas TCP does not. D. TCP is always faster than UDP in all network conditions. Answer: B 54. Browser Connection Management Modern web browsers mitigate the overhead of establishing multiple TCP connections by: A. Relying exclusively on non-persistent connections for each HTTP request. B. Using connection pooling and, when available, HTTP/2 multiplexing to reuse a single connection for multiple simultaneous requests. C. Forcing every server to use a different port for each request. D. Disabling caching to avoid stale connections. Answer: B 55. DNS Caching Strategy Which mechanism is most critical for improving DNS resolution speed in a distributed system? A. Requiring every query to reach the root DNS servers. B. Caching recent name-to-address mappings at local DNS resolvers to answer subsequent queries quickly. C. Using a centralized DNS server for all queries. D. Encrypting all DNS queries end-to-end. Answer: B 56. TTL Effects in DNS The Time-To-Live (TTL) value in a DNS record primarily determines: A. How frequently a DNS record must be re-signed with DNSSEC. B. The duration for which a DNS resolver may cache the record, affecting both performance and the potential for stale data. C. The physical distance between DNS servers. D. The encryption level applied to the DNS response. Answer: B 57. HTTP/3 and QUIC Which aspect of QUIC (the foundation of HTTP/3) directly addresses the head-of-line blocking problem inherent in TCP? A. QUIC eliminates congestion control entirely. B. QUIC establishes independent, multiplexed streams over UDP, so packet loss in one stream does not stall others. C. QUIC forces a new TCP connection for every HTTP request. D. QUIC compresses all data into a single stream. Answer: B 58. SMTP Persistent Connections What is one implication of using persistent connections in SMTP for mail delivery? A. It eliminates the need for the SMTP handshake. B. It reduces the overhead of establishing multiple TCP connections but may increase the memory usage on the server due to long-lived connections. C. It guarantees that all email messages are delivered in real time. D. It forces email messages to be encrypted by default. Answer: B 59. IMAP vs. POP3 Which of the following best distinguishes IMAP from POP3 regarding email management? A. IMAP downloads emails to the client and then deletes them from the server, whereas POP3 always leaves a copy on the server. B. IMAP allows for server-side management (synchronization, folder organization) of emails, whereas POP3 typically downloads and optionally deletes emails from the server. C. POP3 supports multiple folders and state synchronization, while IMAP does not. D. IMAP is used exclusively for sending email, whereas POP3 is used for receiving email. Answer: B 60. BitTorrent Tit-for-Tat Mechanism In BitTorrent, the tit-for-tat strategy primarily encourages: A. Free-riding by allowing peers to download without uploading. B. Reciprocal exchange of file chunks by prioritizing peers who offer higher upload rates, though it may disadvantage new peers initially. C. Centralized control over file distribution. D. The use of a single peer to serve all file chunks. Answer: B 61. Manifest Files in DASH In DASH (Dynamic Adaptive Streaming over HTTP), the manifest file is crucial because it: A. Specifies the encryption keys for all video chunks. B. Lists all available video representations (different bitrates and resolutions) and the corresponding URLs for each chunk, enabling adaptive bitrate selection. C. Determines the fixed quality level for the entire streaming session. D. Directly controls the client's network connection parameters. Answer: B 62. Mitigating DNS MITM Attacks Which security mechanism is most critical in preventing man-in-the-middle (MITM) attacks during DNS resolution? A. DNS caching B. Dynamic DNS updates C. DNSSEC, which digitally signs DNS responses to verify authenticity and integrity D. Increased TTL values for all DNS records Answer: C 63. Primary Function Which of the following best describes the primary function of the application layer? A. To ensure reliable packet delivery through error correction. B. To provide an interface for user applications to access network services. C. To encapsulate data into frames for physical transmission. D. To route packets across multiple networks. Answer: B 64. Application Services Which service is typically NOT provided by the application layer? A. Web browsing B. Email exchange C. DNS name resolution D. Routing between networks Answer: D 65. Client-Server vs. Peer-to-Peer In a client-server architecture, the server is characterized by: A. Intermittent connectivity and dynamic IP addresses. B. Being a dedicated, always-on host that provides services to clients. C. Directly communicating with other clients to share files. D. Operating only on local area networks. Answer: B 66. Socket Basics A socket is best described as: A. A physical connection port on a router. B. A software endpoint defined by an IP address and a port number, used for communication between processes. C. A temporary data cache used in protocol processing. D. A mechanism for encrypting data at the application layer. Answer: B 67. Port Numbers Which of the following is the standard port number for HTTP traffic? A. 21 B. 25 C. 80 D. 110 Answer: C 68. HTTP Methods Which HTTP method is most appropriate for submitting form data that updates information on the server? A. GET B. POST C. HEAD D. OPTIONS Answer: B 69. Persistent Connections What is the primary advantage of persistent HTTP connections (keep-alive) over non-persistent ones? A. They require a new TCP handshake for each object. B. They reduce latency by reusing an existing TCP connection for multiple requests. C. They automatically encrypt all HTTP traffic. D. They eliminate the need for DNS resolution. Answer: B 70. HTTP Status Codes A 404 status code in an HTTP response indicates: A. The request succeeded. B. The resource has permanently moved to a new location. C. The requested resource could not be found on the server. D. The server encountered an internal error. Answer: C 71. Conditional GET The "If-Modified-Since" header in an HTTP GET request is used to: A. Force the server to send a new version of the resource. B. Allow the server to reply with a 304 Not Modified status if the cached version is current. C. Increase the security of the HTTP transaction. D. Indicate that the request should be handled with high priority. Answer: B 72. DNS Purpose The Domain Name System (DNS) primarily serves to: A. Encrypt data before it is sent over the Internet. B. Translate human-friendly domain names into IP addresses. C. Cache web pages to speed up browser access. D. Distribute email messages between servers. Answer: B 73. DNS Caching What is a key benefit of DNS caching at local resolvers? A. It forces all queries to go to root DNS servers. B. It reduces lookup latency by reusing recent domain-to-IP mappings. C. It guarantees that all DNS responses are digitally signed. D. It increases the TTL for every DNS record. Answer: B 74. Email Protocol – SMTP Which protocol is primarily responsible for the delivery of email messages between mail servers? A. POP3 B. IMAP C. SMTP D. HTTP Answer: C 75. Email Retrieval Protocol When a user wants to access their email while keeping messages on the server for synchronization across devices, which protocol is most appropriate? A. SMTP B. IMAP C. POP3 D. FTP Answer: B 76. File Transfer Protocol Which protocol is designed specifically for transferring files between a client and a server? A. HTTP B. FTP C. SMTP D. DNS Answer: B 77. Transport for HTTP HTTP relies on which transport protocol to ensure reliable data delivery? A. UDP B. TCP C. SCTP D. ICMP Answer: B 78. Adaptive Streaming – DASH What is the primary function of a manifest file in DASH (Dynamic Adaptive Streaming over HTTP)? A. To store encryption keys for secure transmission B. To list available video chunk URLs and corresponding bitrate representations C. To permanently cache the entire video on the client D. To define the client's network settings Answer: B 79. Peer-to-Peer Challenges One of the main challenges in a P2P file-sharing system is: A. The constant availability of all peers with static IP addresses. B. Handling dynamic peer churn and changing IP addresses, which can affect file availability and download speeds. C. The centralized control over the file distribution process. D. Ensuring that only one peer provides data to all others simultaneously. Answer: B 80. HTTP/2 Multiplexing Which feature of HTTP/2 helps reduce head-of-line blocking compared to HTTP/1.1? A. The use of multiple TCP connections per request B. Multiplexing multiple streams concurrently over a single TCP connection C. Dropping header information entirely D. Establishing a separate UDP connection for each request Answer: B 81. Server Push in HTTP/2 The server push feature in HTTP/2 is designed to: A. Allow the server to proactively send resources to the client before they are requested, potentially reducing overall load time. B. Force the client to send additional requests for confirmation. C. Replace client-initiated requests entirely. D. Increase the number of TCP handshakes. Answer: A 82. DNS Record Types Which DNS record type maps a domain name to its corresponding IPv4 address? A. NS record B. MX record C. A record D. CNAME record Answer: C 83. Caching in Web Proxies What is the main purpose of using a web proxy cache? A. To encrypt all outgoing HTTP requests. B. To reduce network latency by serving cached copies of frequently requested resources. C. To permanently store all web pages on a local server. D. To bypass DNS resolution. Answer: B 84. HTTP Header Fields Which HTTP header field is used to control client-side caching? A. Content-Type B. Cache-Control C. User-Agent D. Accept-Encoding Answer: B 85. VoIP Protocols Which set of protocols is typically used to support real-time voice communication over IP? A. FTP and SMTP B. HTTP and DNS C. SIP and RTP D. POP3 and IMAP Answer: C