0% found this document useful (0 votes)
25 views12 pages

Ch2 Computer Networks - GPT

The document covers various aspects of the application layer in networking, including its role, protocols, and services such as HTTP, DNS, and email. It discusses client-server and peer-to-peer paradigms, socket programming, and the advantages of persistent connections. Additionally, it highlights improvements in HTTP/2 and HTTP/3, the importance of caching, and security concerns related to dynamic DNS updates.

Uploaded by

ozcan8479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views12 pages

Ch2 Computer Networks - GPT

The document covers various aspects of the application layer in networking, including its role, protocols, and services such as HTTP, DNS, and email. It discusses client-server and peer-to-peer paradigms, socket programming, and the advantages of persistent connections. Additionally, it highlights improvements in HTTP/2 and HTTP/3, the importance of caching, and security concerns related to dynamic DNS updates.

Uploaded by

ozcan8479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

1.

Role of the Application Layer


Which statement best describes the primary function of the application layer?
A. It encapsulates data into frames for transmission over the physical medium.
B. It acts as an interface between the user (or application) and the network, managing protocols that
present data to the user.
C. It routes data packets across different networks.
D. It provides error detection and correction on a hop-by-hop basis.
Answer: B
2. Network Applications Overview
Which of the following is NOT typically considered an application-layer service?
A. Web browsing
B. Email communication
C. Routing between autonomous systems
D. Peer-to-peer file sharing
Answer: C
3. Client-Server Paradigm
In the client-server model, which characteristic is most accurate?
A. Clients typically have permanent IP addresses and always remain connected.
B. Servers are always-on hosts with permanent IP addresses, while clients can have dynamic
addresses and intermittent connections.
C. Both clients and servers communicate directly without intermediaries.
D. All processes act simultaneously as clients and servers in every transaction.
Answer: B
4. Peer-to-Peer Paradigm
What is a defining characteristic of the peer-to-peer (P2P) paradigm?
A. A centralized server always mediates communication between endpoints.
B. All participating nodes (peers) are required to be permanently connected.
C. Peers directly communicate with each other, with no single central server managing requests.
D. P2P networks can only be used for file sharing.
Answer: C
5. Sockets and Process Communication
Which statement best describes a socket in network programming?
A. A physical port on a router.
B. An endpoint for communication between two processes running on the same or different hosts,
identified by an IP address and a port number.
C. A protocol used for encryption at the application layer.
D. A temporary storage location for data packets awaiting transmission.
Answer: B
6. Port Numbers
What is the primary purpose of port numbers in socket addressing?
A. To uniquely identify a host on the Internet.
B. To determine the physical connection speed.
C. To differentiate between multiple processes running on the same host.
D. To specify the security level of a connection.
Answer: C
7. HTTP Protocol
Which application-layer protocol is most commonly used for retrieving web pages?
A. SMTP
B. FTP
C. HTTP
D. DNS
Answer: C
8. HTTP Connection Management
What feature of HTTP/1.1 allows multiple objects to be transferred over a single TCP connection?
A. Non-persistent connections
B. Persistent connections (keep-alive)
C. UDP encapsulation
D. Stateless communication
Answer: B
9. Web Caching
What is the primary benefit of using a web cache (proxy server)?
A. It increases the load on the origin server by duplicating requests.
B. It reduces network traffic and improves response time by serving frequently requested objects
from a location closer to the client.
C. It ensures that all HTTP messages are encrypted.
D. It eliminates the need for DNS resolution.
Answer: B
10. Cookies and State Maintenance
How do HTTP cookies help maintain state in an otherwise stateless protocol?
A. By storing encryption keys for each session
B. By preserving state information across multiple HTTP transactions through client-side storage and
subsequent inclusion in HTTP requests
C. By establishing persistent TCP connections
D. By caching entire web pages on the server
Answer: B
11. DNS Fundamentals
What is the primary purpose of the Domain Name System (DNS)?
A. To translate human-readable domain names into IP addresses and vice versa
B. To manage the allocation of IP addresses
C. To cache web pages for faster access
D. To encrypt data transmitted over the Internet
Answer: A
12. DNS Query Types
Which DNS query type delegates the full resolution process to the contacted name server, thereby
placing the burden of recursion on that server?
A. Iterative query
B. Recursive query
C. CNAME query
D. MX query
Answer: B
13. DNS Records
Which type of DNS record is used to associate a domain name with its corresponding IPv4 address?
A. NS record
B. A record
C. MX record
D. CNAME record
Answer: B
14. Mail Protocols
Which protocol is primarily used for delivering email messages between mail servers?
A. POP3
B. IMAP
C. SMTP
D. HTTP
Answer: C
15. Email Retrieval
Which protocol is commonly used for retrieving and managing email messages stored on a mail
server?
A. SMTP
B. IMAP
C. FTP
D. Telnet
Answer: B
16. TCP vs. UDP in Socket Programming
What is the main difference between TCP and UDP in the context of socket programming?
A. TCP is connectionless, whereas UDP is connection-oriented.
B. TCP provides reliable, ordered delivery of data, while UDP offers faster, but unreliable, datagram
transmission.
C. UDP supports flow control and congestion control, whereas TCP does not.
D. UDP is used only for email applications.
Answer: B
17. Adaptive Streaming (DASH)
What is the primary objective of Dynamic Adaptive Streaming over HTTP (DASH) in multimedia
applications?
A. To provide a constant bit rate regardless of network conditions
B. To allow the streaming client to dynamically select video chunks encoded at different quality
levels based on current available bandwidth
C. To encrypt video content during transmission
D. To establish multiple simultaneous TCP connections for faster delivery
Answer: B
18. HTTP/2 Improvements
Which of the following is a key feature of HTTP/2 that improves upon HTTP/1.1?
A. It eliminates the need for TCP connections.
B. It introduces multiplexing, allowing multiple streams of data to be interleaved over a single
connection, thereby reducing head-of-line blocking.
C. It requires a new set of status codes that are incompatible with HTTP/1.1.
D. It removes persistent connections in favor of non-persistent ones.
Answer: B
19. HTTP/3 Characteristics
Which statement about HTTP/3 is correct?
A. HTTP/3 is built on TCP and focuses solely on backward compatibility.
B. HTTP/3 is built on UDP (using QUIC) and offers improved performance with reduced latency
and enhanced security features.
C. HTTP/3 eliminates the need for header compression.
D. HTTP/3 does not support multiplexing.
Answer: B
20. P2P File Distribution
In BitTorrent’s tit-for-tat mechanism, what is the primary purpose of this strategy?
A. To maximize download speed by preferentially exchanging data with peers that provide higher
upload rates
B. To ensure that all peers upload data equally regardless of their performance
C. To encrypt file chunks during transfer
D. To designate a central server that manages all file exchanges
Answer: A
21. Role of Trackers in P2P Networks
What is the primary function of a tracker in a BitTorrent network?
A. To host the entire file for download
B. To keep a list of peers participating in the torrent and help new peers discover other peers
C. To enforce digital rights management (DRM) on shared files
D. To compress file chunks before distribution
Answer: B
22. Overall Application Layer Perspective
Which of the following statements best summarizes the role of the application layer?
A. It is responsible for routing data across different networks using IP addresses.
B. It provides the interface and protocols that allow user-level applications to interact with the
network, supporting diverse services such as web browsing, email, file sharing, and video streaming.
C. It ensures that data is transmitted over the physical medium without error.
D. It manages the flow of data between routers in the network core.

Answer: B

23. HTTP Methods and Their Purposes


Which HTTP method is best suited for submitting data to a server for processing (such as form
data)?
A. GET
B. POST
C. HEAD
D. OPTIONS
Answer: B
24. Persistent vs. Non-Persistent HTTP
What is the primary advantage of persistent HTTP connections over non-persistent connections?
A. They require a new TCP handshake for every object transfer.
B. They reduce latency by reusing an already established TCP connection for multiple HTTP
requests.
C. They enforce encryption on all transferred data.
D. They mandate that each HTTP message is sent as a separate packet.
Answer: B
25. HTTP Status Codes
In an HTTP response, which component of the message is used to indicate whether a request
succeeded or failed?
A. The request line
B. The status line
C. The header fields
D. The message body
Answer: B
26. Cookie Mechanisms
How do cookies primarily help maintain state across HTTP transactions?
A. By storing session information on the server exclusively
B. By embedding a unique identifier in subsequent HTTP requests from the client
C. By encrypting the entire HTTP message
D. By initiating a persistent TCP connection
Answer: B
27. DNS Resolution Strategies
Which DNS query type offloads the entire name resolution process to the queried DNS server?
A. Iterative query
B. Recursive query
C. Broadcast query
D. Multicast query
Answer: B
28. DNS Caching Benefits
What is the main benefit of caching DNS query results at local name servers?
A. It increases the load on root DNS servers.
B. It eliminates the need for iterative queries entirely.
C. It reduces resolution latency and overall network traffic.
D. It mandates that all DNS records are updated in real time.
Answer: C
29. Web Caching and Performance
How does a proxy cache improve web performance for clients?
A. By encrypting HTTP messages before sending them
B. By storing frequently requested web objects closer to the client, reducing access delay
C. By replacing the origin server entirely
D. By eliminating the need for DNS lookups
Answer: B
30. Conditional GET in HTTP
The "If-Modified-Since" header in an HTTP GET request is used to:
A. Ensure that a new copy of the object is always downloaded
B. Allow the client to receive a 304 Not Modified response when the cached copy is current
C. Force the server to revalidate the client's TCP connection
D. Indicate that the object should be compressed during transmission
Answer: B
31. HTTP/2 Improvements
Which of the following features is a key improvement of HTTP/2 over HTTP/1.1?
A. Use of multiple simultaneous TCP connections per request
B. Multiplexing multiple streams over a single TCP connection
C. Dropping all header fields for faster processing
D. Replacing TCP with UDP for all data transfers
Answer: B
32. HTTP/3 Distinctions
How does HTTP/3 primarily differ from HTTP/2?
A. It uses TCP to ensure reliability.
B. It uses UDP (via QUIC) to reduce latency and mitigate head-of-line blocking.
C. It removes support for server push.
D. It does not support multiplexing.
Answer: B
33. Email Protocol Functions
Which protocol is used for reliably transferring email messages between mail servers?
A. POP3
B. IMAP
C. SMTP
D. HTTP
Answer: C
34. Email Retrieval Protocols
When a user wishes to view their email without downloading it permanently, which protocol is most
suitable?
A. SMTP
B. IMAP
C. FTP
D. SNMP
Answer: B
35. Socket Programming Essentials
In TCP socket programming, what is required to establish a connection between a client and a
server?
A. The client must bind to a fixed port number identical to the server’s port.
B. The server must be actively listening on a well-known port while the client initiates a connection
to that port.
C. Both client and server must use UDP sockets.
D. The client must first send an HTTP request before connecting.
Answer: B
36. Peer-to-Peer (P2P) Architectures
What is a primary advantage of a P2P architecture compared to a traditional client-server model?
A. It centralizes control in a single server.
B. It allows for self-scalability as each new peer contributes resources for both downloading and
uploading.
C. It guarantees higher security through central monitoring.
D. It always provides faster data transfer than client-server.
Answer: B
37. Role of Trackers in BitTorrent
In a BitTorrent network, what is the role of the tracker?
A. It stores the entire file to be shared among peers.
B. It maintains a list of peers participating in the file distribution, enabling peers to find each other.
C. It encrypts the file chunks for secure distribution.
D. It prioritizes file chunks for faster download.
Answer: B
38. CDNs and Content Distribution
How do Content Distribution Networks (CDNs) enhance the delivery of video content?
A. By storing copies of content at distributed nodes closer to end users, reducing latency and load on
origin servers
B. By replacing the need for adaptive streaming protocols
C. By centralizing all content at a single data center
D. By encrypting content with proprietary algorithms
Answer: A
39. Adaptive Streaming (DASH)
What is the main benefit of DASH (Dynamic Adaptive Streaming over HTTP) for video streaming
applications?
A. It locks the video quality to a constant bit rate regardless of network conditions.
B. It allows the client to dynamically adjust the video quality based on real-time network bandwidth,
reducing buffering.
C. It eliminates the need for TCP connections.
D. It compresses video files into a single stream without fragmentation.
Answer: B
40. DNS Record Types
Which DNS record type is used for mapping a domain name to an IPv4 address?
A. NS record
B. MX record
C. A record
D. CNAME record
Answer: C
41. DNS Hierarchical Structure
What is a key reason for the hierarchical design of the DNS system?
A. To allow any single server to handle all queries worldwide.
B. To distribute the load and provide fault tolerance, preventing a single point of failure.
C. To enforce a centralized control over domain names.
D. To ensure that DNS queries are always resolved within the local network.
Answer: B
42. Application Layer Overall Perspective
Which statement best summarizes the role of the application layer in the network stack?
A. It is responsible for physical data transmission between devices.
B. It provides the interface and protocols that enable user-level applications (such as web browsing,
email, file sharing, and streaming) to interact with the network.
C. It manages routing and forwarding of packets across different networks.
D. It primarily handles error correction and retransmission of lost packets.
Answer: B
43. Persistent HTTP Challenges
In high-latency networks, one significant challenge with persistent HTTP connections is:
A. The inability to reuse TCP connections for multiple requests.
B. Increased risk of head-of-line blocking delaying all subsequent HTTP responses.
C. Mandatory encryption overhead on every connection.
D. Frequent re-establishment of TCP handshakes.
Answer: B
44. HTTP/2 Header Compression (HPACK)
Which statement best characterizes HPACK, the header compression mechanism in HTTP/2?
A. It compresses headers using a static dictionary only, without dynamic updates.
B. It uses both static and dynamic tables to reduce redundant header information, though it may be
vulnerable to compression-based attacks.
C. It eliminates all header fields to minimize latency.
D. It relies solely on transport-layer encryption for header security.
Answer: B
45. Dynamic DNS Updates Security
Concerning dynamic DNS updates as per RFC 2136, what is the primary security risk if proper
authentication is not enforced?
A. Unauthorized clients might inject fraudulent records, leading to DNS hijacking or cache
poisoning.
B. Excessive DNS query traffic leading to denial-of-service on the local server.
C. Loss of the hierarchical structure of DNS zones.
D. Inability to resolve domain names due to TTL mismanagement.
Answer: A
46. P2P Churn Effects
In a BitTorrent-like system, a high peer churn rate (frequent joining and leaving) can primarily lead
to:
A. Increased overall system throughput as more peers contribute.
B. Reduced file availability and degraded download speeds due to an unstable peer set.
C. A complete elimination of tit-for-tat incentives.
D. No observable effect if the tracker is highly available.
Answer: B
47. DNSSEC Tradeoffs
How does DNSSEC mitigate DNS poisoning, and what is a primary limitation of its deployment?
A. It encrypts DNS responses to prevent tampering, but the encryption overhead significantly slows
down resolution.
B. It digitally signs DNS records to ensure authenticity; however, increased message sizes can lead
to fragmentation and performance issues.
C. It centralizes DNS resolution to trusted servers, but this introduces a single point of failure.
D. It caches DNS responses longer to ensure stability, which can cause outdated records to persist.
Answer: B
48. Live Video CDN Challenges
Compared to on-demand streaming, a major design challenge for CDNs delivering live video is:
A. Handling a large number of simultaneous file transfers.
B. Ensuring real-time synchronization and low latency across geographically dispersed nodes.
C. Storing large libraries of video content on every edge server.
D. Reliably delivering static web pages along with dynamic content.
Answer: B
49. Adaptive Bitrate Decision Making
In DASH, the client chooses the video quality based primarily on:
A. The maximum encoding rate available on the server.
B. A pre-configured default setting that remains unchanged during a session.
C. Real-time measurements of available bandwidth and buffer occupancy to select the optimal
bitrate.
D. The number of peers currently streaming the video.
Answer: C
50. HTTP/2 Server Push Mechanism
Which of the following correctly describes the server push feature in HTTP/2, and what is a potential
drawback?
A. The server push proactively sends unsolicited resources to the client, which can waste bandwidth
if the client does not need them.
B. Server push requires a new TCP connection for every resource, increasing overhead.
C. It forces the client to cache all pushed resources indefinitely.
D. It eliminates the need for client-initiated requests, which may overwhelm the client.
Answer: A
51. Conditional GET Efficiency
A conditional GET (using the "If-Modified-Since" header) primarily reduces network traffic by:
A. Forcing the server to always send the full object for validation.
B. Allowing the client to receive a minimal 304 Not Modified response when the cached version is
up-to-date, thereby avoiding full object transmission.
C. Compressing the response on the fly before transmission.
D. Caching the entire HTTP conversation at the client side.
Answer: B
52. TCP Pipelining Impact
In HTTP/1.1, pipelining can suffer from head-of-line blocking due to TCP's behavior. This is
because:
A. Each HTTP request must complete before the next one is sent.
B. Loss or delay in one TCP segment can delay all subsequent segments in the pipeline, even if they
are independent.
C. Multiple TCP connections are used simultaneously, causing congestion.
D. It forces the client to re-establish connections for every object.
Answer: B
53. UDP vs. TCP Considerations
When an application uses both UDP and TCP concurrently, which inherent difference must be taken
into account?
A. UDP’s inherent connection-orientation compared to TCP’s statelessness.
B. TCP guarantees reliability and order, while UDP may deliver packets out-of-order or drop them,
requiring the application to handle such issues if needed.
C. UDP provides built-in congestion control, whereas TCP does not.
D. TCP is always faster than UDP in all network conditions.
Answer: B
54. Browser Connection Management
Modern web browsers mitigate the overhead of establishing multiple TCP connections by:
A. Relying exclusively on non-persistent connections for each HTTP request.
B. Using connection pooling and, when available, HTTP/2 multiplexing to reuse a single connection
for multiple simultaneous requests.
C. Forcing every server to use a different port for each request.
D. Disabling caching to avoid stale connections.
Answer: B
55. DNS Caching Strategy
Which mechanism is most critical for improving DNS resolution speed in a distributed system?
A. Requiring every query to reach the root DNS servers.
B. Caching recent name-to-address mappings at local DNS resolvers to answer subsequent queries
quickly.
C. Using a centralized DNS server for all queries.
D. Encrypting all DNS queries end-to-end.
Answer: B
56. TTL Effects in DNS
The Time-To-Live (TTL) value in a DNS record primarily determines:
A. How frequently a DNS record must be re-signed with DNSSEC.
B. The duration for which a DNS resolver may cache the record, affecting both performance and the
potential for stale data.
C. The physical distance between DNS servers.
D. The encryption level applied to the DNS response.
Answer: B
57. HTTP/3 and QUIC
Which aspect of QUIC (the foundation of HTTP/3) directly addresses the head-of-line blocking
problem inherent in TCP?
A. QUIC eliminates congestion control entirely.
B. QUIC establishes independent, multiplexed streams over UDP, so packet loss in one stream does
not stall others.
C. QUIC forces a new TCP connection for every HTTP request.
D. QUIC compresses all data into a single stream.
Answer: B
58. SMTP Persistent Connections
What is one implication of using persistent connections in SMTP for mail delivery?
A. It eliminates the need for the SMTP handshake.
B. It reduces the overhead of establishing multiple TCP connections but may increase the memory
usage on the server due to long-lived connections.
C. It guarantees that all email messages are delivered in real time.
D. It forces email messages to be encrypted by default.
Answer: B
59. IMAP vs. POP3
Which of the following best distinguishes IMAP from POP3 regarding email management?
A. IMAP downloads emails to the client and then deletes them from the server, whereas POP3
always leaves a copy on the server.
B. IMAP allows for server-side management (synchronization, folder organization) of emails,
whereas POP3 typically downloads and optionally deletes emails from the server.
C. POP3 supports multiple folders and state synchronization, while IMAP does not.
D. IMAP is used exclusively for sending email, whereas POP3 is used for receiving email.
Answer: B
60. BitTorrent Tit-for-Tat Mechanism
In BitTorrent, the tit-for-tat strategy primarily encourages:
A. Free-riding by allowing peers to download without uploading.
B. Reciprocal exchange of file chunks by prioritizing peers who offer higher upload rates, though it
may disadvantage new peers initially.
C. Centralized control over file distribution.
D. The use of a single peer to serve all file chunks.
Answer: B
61. Manifest Files in DASH
In DASH (Dynamic Adaptive Streaming over HTTP), the manifest file is crucial because it:
A. Specifies the encryption keys for all video chunks.
B. Lists all available video representations (different bitrates and resolutions) and the corresponding
URLs for each chunk, enabling adaptive bitrate selection.
C. Determines the fixed quality level for the entire streaming session.
D. Directly controls the client's network connection parameters.
Answer: B
62. Mitigating DNS MITM Attacks
Which security mechanism is most critical in preventing man-in-the-middle (MITM) attacks during
DNS resolution?
A. DNS caching
B. Dynamic DNS updates
C. DNSSEC, which digitally signs DNS responses to verify authenticity and integrity
D. Increased TTL values for all DNS records
Answer: C
63. Primary Function
Which of the following best describes the primary function of the application layer?
A. To ensure reliable packet delivery through error correction.
B. To provide an interface for user applications to access network services.
C. To encapsulate data into frames for physical transmission.
D. To route packets across multiple networks.
Answer: B
64. Application Services
Which service is typically NOT provided by the application layer?
A. Web browsing
B. Email exchange
C. DNS name resolution
D. Routing between networks
Answer: D
65. Client-Server vs. Peer-to-Peer
In a client-server architecture, the server is characterized by:
A. Intermittent connectivity and dynamic IP addresses.
B. Being a dedicated, always-on host that provides services to clients.
C. Directly communicating with other clients to share files.
D. Operating only on local area networks.
Answer: B
66. Socket Basics
A socket is best described as:
A. A physical connection port on a router.
B. A software endpoint defined by an IP address and a port number, used for communication
between processes.
C. A temporary data cache used in protocol processing.
D. A mechanism for encrypting data at the application layer.
Answer: B
67. Port Numbers
Which of the following is the standard port number for HTTP traffic?
A. 21
B. 25
C. 80
D. 110
Answer: C
68. HTTP Methods
Which HTTP method is most appropriate for submitting form data that updates information on the
server?
A. GET
B. POST
C. HEAD
D. OPTIONS
Answer: B
69. Persistent Connections
What is the primary advantage of persistent HTTP connections (keep-alive) over non-persistent
ones?
A. They require a new TCP handshake for each object.
B. They reduce latency by reusing an existing TCP connection for multiple requests.
C. They automatically encrypt all HTTP traffic.
D. They eliminate the need for DNS resolution.
Answer: B
70. HTTP Status Codes
A 404 status code in an HTTP response indicates:
A. The request succeeded.
B. The resource has permanently moved to a new location.
C. The requested resource could not be found on the server.
D. The server encountered an internal error.
Answer: C
71. Conditional GET
The "If-Modified-Since" header in an HTTP GET request is used to:
A. Force the server to send a new version of the resource.
B. Allow the server to reply with a 304 Not Modified status if the cached version is current.
C. Increase the security of the HTTP transaction.
D. Indicate that the request should be handled with high priority.
Answer: B
72. DNS Purpose
The Domain Name System (DNS) primarily serves to:
A. Encrypt data before it is sent over the Internet.
B. Translate human-friendly domain names into IP addresses.
C. Cache web pages to speed up browser access.
D. Distribute email messages between servers.
Answer: B
73. DNS Caching
What is a key benefit of DNS caching at local resolvers?
A. It forces all queries to go to root DNS servers.
B. It reduces lookup latency by reusing recent domain-to-IP mappings.
C. It guarantees that all DNS responses are digitally signed.
D. It increases the TTL for every DNS record.
Answer: B
74. Email Protocol – SMTP
Which protocol is primarily responsible for the delivery of email messages between mail servers?
A. POP3
B. IMAP
C. SMTP
D. HTTP
Answer: C
75. Email Retrieval Protocol
When a user wants to access their email while keeping messages on the server for synchronization
across devices, which protocol is most appropriate?
A. SMTP
B. IMAP
C. POP3
D. FTP
Answer: B
76. File Transfer Protocol
Which protocol is designed specifically for transferring files between a client and a server?
A. HTTP
B. FTP
C. SMTP
D. DNS
Answer: B
77. Transport for HTTP
HTTP relies on which transport protocol to ensure reliable data delivery?
A. UDP
B. TCP
C. SCTP
D. ICMP
Answer: B
78. Adaptive Streaming – DASH
What is the primary function of a manifest file in DASH (Dynamic Adaptive Streaming over
HTTP)?
A. To store encryption keys for secure transmission
B. To list available video chunk URLs and corresponding bitrate representations
C. To permanently cache the entire video on the client
D. To define the client's network settings
Answer: B
79. Peer-to-Peer Challenges
One of the main challenges in a P2P file-sharing system is:
A. The constant availability of all peers with static IP addresses.
B. Handling dynamic peer churn and changing IP addresses, which can affect file availability and
download speeds.
C. The centralized control over the file distribution process.
D. Ensuring that only one peer provides data to all others simultaneously.
Answer: B
80. HTTP/2 Multiplexing
Which feature of HTTP/2 helps reduce head-of-line blocking compared to HTTP/1.1?
A. The use of multiple TCP connections per request
B. Multiplexing multiple streams concurrently over a single TCP connection
C. Dropping header information entirely
D. Establishing a separate UDP connection for each request
Answer: B
81. Server Push in HTTP/2
The server push feature in HTTP/2 is designed to:
A. Allow the server to proactively send resources to the client before they are requested, potentially
reducing overall load time.
B. Force the client to send additional requests for confirmation.
C. Replace client-initiated requests entirely.
D. Increase the number of TCP handshakes.
Answer: A
82. DNS Record Types
Which DNS record type maps a domain name to its corresponding IPv4 address?
A. NS record
B. MX record
C. A record
D. CNAME record
Answer: C
83. Caching in Web Proxies
What is the main purpose of using a web proxy cache?
A. To encrypt all outgoing HTTP requests.
B. To reduce network latency by serving cached copies of frequently requested resources.
C. To permanently store all web pages on a local server.
D. To bypass DNS resolution.
Answer: B
84. HTTP Header Fields
Which HTTP header field is used to control client-side caching?
A. Content-Type
B. Cache-Control
C. User-Agent
D. Accept-Encoding
Answer: B
85. VoIP Protocols
Which set of protocols is typically used to support real-time voice communication over IP?
A. FTP and SMTP
B. HTTP and DNS
C. SIP and RTP
D. POP3 and IMAP
Answer: C

You might also like