0% found this document useful (0 votes)
2 views

Cn - Objective Questions

The document contains a series of objective questions and answers related to networking concepts, covering topics such as the physical layer, data link layer, network layer, and various protocols. It includes multiple-choice questions, fill-in-the-blank questions, and explanations of key terms and concepts. The questions assess knowledge on topics like transmission media, error control, and the OSI model.

Uploaded by

RojaRamani Adapa
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Cn - Objective Questions

The document contains a series of objective questions and answers related to networking concepts, covering topics such as the physical layer, data link layer, network layer, and various protocols. It includes multiple-choice questions, fill-in-the-blank questions, and explanations of key terms and concepts. The questions assess knowledge on topics like transmission media, error control, and the OSI model.

Uploaded by

RojaRamani Adapa
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

OBJECTIVE QUESTIONS

UNIT:I

1. The physical layer is concerned with ___________


a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery
Answer: a

2. Which transmission media provides the highest transmission speed in a network?


a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
Answer: c

3. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: a

4. The portion of physical layer that interfaces with the media access control sublayer is
called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
Answer: a

5. The physical layer provides __________


a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
Answers: d

6. In asynchronous serial communication the physical layer provides ___________


a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signaling
Answer: c
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned

Answer: d

8. The physical layer translates logical communication requests from the ______ into
hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer: a

9. A single channel is shared by multiple signals by ____________


a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation
Answer: c

10. Wireless transmission of signals can be done via ___________


a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
Answer: d

10.. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
Answer:b

11. Network congestion occurs


a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
Answer:a
12. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Answer:b

13) The IETF standards documents are called


a) RFC
b) RCF
c) ID
d) None of the mentioned
Answer: a

14) In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are
a) Added
b) Removed
c) Rearranged
d) Modified
Answer: a

15) The structure or format of data is called


a) Syntax
b) Semantics
c) Struct
d) None of the mentioned
Answer: a

16) Communication between a computer and a keyboard involves ______________


transmission
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: d

17) The first Network


a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
Answer: d

18) The _______ is the physical path over which a message travels
a) Ppath
b) Medium
c) Protocol
d) Route
Answer: b

19) Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c

20) Which of this is not a network edge device?


a) PC
b) Smartphones
c) Servers
d) Switch
Answer: d.

21) A set of rules that governs data communication


a) Protocols
b) Standards
c) RFCs
d) None of the mentioned
Answer: a

22) Three or more devices share a link in ________ connection


a) Unipoint
b) Multipoint
c) Point to point
d) None of the mentioned
Answer: b
23)OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
Answer:a.
24). The OSI model has ___ layers.
a) 4
b) 5
c) 6
d) 7
Answer:d

25). TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) presentation layer
c) application layer
d) both (a) and (b)
Answer:d

26). Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
Answer:c

27). Which address is used in an internet employing the TCP/IP protocols?


a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Answer:d

28). TCP/IP model was developed _____ the OSI model.


a) prior to
b) after
c) simultaneous to
d) none of the mentioned
Answer:a
29). Which layer is responsible for process to process delivery?
a) network layer
b) transport layer
c) session layer
d) data link layer
Answer:b.
30). Which address identifies a process on a host?
a) physical address
b) logical address
c) port address
d) specific address
Answer:c

Fill in the blanks

31. Coaxial cables can be used for………


Answer: Both in telephone and cable TV networks.

32. Eavesdropping is not possible in…--------------


Answer: fiber optics

33. In digital data transmission baud rate is equal to --------------


Answer: Bit rate

34. In simplex transmission data can be Transmitted in --------------direction.


Answer: One

35. Data networks for the efficiency of communication reasons, uses--------------


Answer: Full-duplex transmission

36. PCs connected with --------------can also be used for education, entertainment, etc.
Answer: Modem

37. The meaning of a digital channel means that the channel is --------------.
Answer: Carrying digital data.

38. Fiber optics communication system uses--------------.


Answer: Full-duplex

39. A different carrier frequency is used for each channel in --------------. Multiplexing.
Answer: Frequency Division

40. The Ethernet ___________ sub layer is responsible for communicating directly with
the physical layer.
Answer: Media Access Control(MAC)

UNIT:II

1. The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a

2. Which of the following tasks is not done by data link layer?


a) framing
b) error control
c) flow control
d) channel coding
Answer: d

3. Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: b

4. Header of a frame generally contains ______________


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer: d

5. Automatic repeat request error management mechanism is provided by ________


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
Answer: a

6. When 2 or more bits in a data unit has been changed during the transmission, the error
is called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer:b

7. CRC stands for __________


a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer: a

8. Which of the following is a data link protocol?


a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer: d

9. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c

10. The technique of temporarily delaying outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: a

11. The data link layer takes the packets from _____ and encapsulates them into frames
for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer:a
.
12. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer:d

13. Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:b

14. Header of a frame generally contains


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer:d

15. Automatic repeat request error management mechanism is provided by


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:a

16. When 2 or more bits in a data unit has been changed during the transmission, the error is
called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
Answer:b

17. CRC stands for


a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer:a

18. Which one of the following is a data link protocol?


a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
Answer:d.
19. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned
Answer:c

20. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
Answer:a

21Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned
Answer:b

22. In wireless distribution system


a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) none of the mentioned
Answer: a

23. A wireless network interface controller can work in


a) infrastructure mode
b) ad-hoc mode
c) both (a) and (b)
d) none of the mentioned
Answer:c

Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is
not required.

24. In wireless network an extended service set is a set of


a) connected basic service sets
b) all stations
c) all access points
d) none of the mentioned
Answer:a

25. Mostly ________ is used in wireless LAN.


a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned
Answer:b

26. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned
Answer:a

27. What is Wired Equivalent Privacy (WEP) ?


a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) none of the mentioned
Answer:b

Explanation:None.
28 What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
Answer:a

29. What is internet?


a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
Answer:b

30. To join the internet, the computer has to be connected to a


a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned

Fill in the blanks


31. ------------is a set of rules that governs the communications between computers on a network.
Answer: Protocol

32. Each web sites is identified by the --------


Answer: URL

33. Aloha is the type of Random access protocol, It have two types one is -------- and another
is------------.
Answer : Pure Aloha and Slotted Aloha

34. ------------- is a flow control protocol.


Answer: Sliding window protocol

35. Sliding Window Protocol. Sliding window protocols are --------- for reliable and sequential
delivery of data frames.
Answer: data link layer protocols

36. The sliding window is also used in --------------------


Answer: Transmission Control Protocol

37. --------- is an implementation of a sliding window protocol.


Answer: . Go back N protocol

38. In Selective Repeat protocol, sender window size is always same as -------------
Answer: receiver window size

39. ------- protocol uses independent acknowledgements only.


Answer: Selective repeat

40. ------------ protocols are devised so that collisions do not occur


Answer: Collision – free
Unit III
1. The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
Answer: c

2. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) congestion control
d) error control
Answer: d

3. A 4 byte IP address consists of __________


a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
Answer: c

4. In virtual circuit network each packet contains ___________


a) full source and destination address
b) a short VC number
c) only source address
d) only destination address
Answer: b

5. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer: d
6. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
Answer: c

7. A subset of a network that includes all the routers but contains no loops is called _______
a) spanning tree
b) spider structure
c) spider tree
d) special tree
Answer: a

8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Answer: d

9. The network layer protocol for internet is __________


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
Answer: b

10. ICMP is primarily used for __________


a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
Answer: a

11. ISP exchanges internet traffic between their networks by


a) internet exchange point
b) subscriber end point
c) ISP end point
d) none of the mentioned
Answer:a

12. Which one of the following protocol is not used in internet?


a) HTTP
b) DHCP
c) DNS
d) none of the mentioned
Answer:d

13. IPv6 addressed have a size of


a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
Answer:c

14. Internet works on


a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
Answer:a

15. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
Answer:c

16. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) none of the mentioned
Answer:a

17. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
Answer:d

18. The network layer concerns with


a) bits
b) frames
c) packets
d) none of the mentioned
Answer:c

19. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) congestion control
d) none of the mentioned
Answer:d

20. The 4 byte IP address consists of


a) network address
b) host address
c) both (a) and (b)
d) none of the mentioned
Answer:c

21. In virtual circuit network each packet contains


a) full source and destination address
b) a short VC number
c) both (a) and (b)
d) none of the mentioned
Answer:b

22. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer:d

23. Multidestination routing


a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) none of the mentioned
Answer:c

24. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
Answer:a

25. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
Answer:d

26. The network layer protocol of internet is


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
Answer:b

27. ICMP is primarily used for


a) error and diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned
Answer:a

28) Ping can


a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
Answer: d

29) Ping sweep is a part of


a) Traceroute
b) Nmap
c) Route
d) Ipconfig
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP addresses which map to
live hosts and are mostly used by network scanning tools like nmap.

30) ICMP is used in


a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
Answer: d

Fill in the blanks

31. In the ipv4, the data gram is of__________


Answers: variable length

32. The header of the datagram in the ipv4 has_________


Answer: 20 to 60 bytes

33. The network layer at the source is responsible for creating a packet from the data coming
from another_______
Answer: protocol

34. A modem is a ------------- de vice.


Answer: Bidirectional
35. A network of networks is known as ----------
Answer: Internet

36. Which level is the network layer in the OSI model _________
Answer: Third

37. Data in network layer is transferred in the form of ____________


Answer: Packets

38. The network layer is considered as the _______ of the network layer.
Answer: Back bone

39. The network layer contains which hardware device--------------, -------------- and -------
Answer: Routers, Bridges and Switches

40. RIP stands for ________


Answer: Routing Information Protocol

Unit IV

1. Transport layer aggregates data from different applications into a single stream before passing
it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer: a

2. Which of the following are transport layer protocols used in networking?


a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
Answer: c

3. User datagram protocol is called connectionless because _____________


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
Answer: a

4. Transmission control protocol ___________


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
Answer: d

5. An endpoint of an inter-process communication flow across a computer network is called


__________
a) socket
b) pipe
c) port
d) machine
Answer: a

6. Socket-style API for windows is called ____________


a) wsock
b) winsock
c) wins
d) sockwi
Answer: b

7. Which one of the following is a version of UDP with congestion control?


a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
Answer: a

8. A _____ is a TCP name for a transport service access point.


a) port
b) pipe
c) node
d) protocol
Answer: a

9. Transport layer protocols deals with ____________


a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
Answer: b

10. Which of the following is a transport layer protocol?


a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
Answer: a
11) TCP is a .......... protocol.
a). stream-oriented
b). message-oriented
c). block-oriented
d). packet-oriented

Answer: a. stream-oriented

12) Which of the following is not the layer of TCP/IP protocol.


A. Physical layer
B. link layer
C. network layer
D. transport layer.

Answer: A. Physical layer

13) TCP groups a number of bytes together into a packet called a ....
A. user datagram
B. segment
C. datagram
D. packet

Answer: B. segment

14) The .......... of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
A. application layer
B. link layer
C. network layer
D. transport layer.

Answer: C. network layer

15) TCP is a(n) ........... transport protocol.


A. protocol delivery
B. reliable
C. best-effort delivery
D. effortless delivery
Answer: B

16) ......... is the protocol that hides the underlying physical network by creating a virtual network
view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)

Answer:A

17) To use the services of UDP, we need ......... socket addresses.


A. four
B. two
C. three
D. four

Answer: B

18) Which of the following is not the name of Regional Internet Registries(RIR) to administer
the network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)

Answer: C

19) UDP packets are called .......


A. user datagrams
B. segments
C. frames
D. packets

Answer: A

20) ............ addresses use 21 bits for the and 8 bits for the portion of the IP address for TCP/IP
network.
A. Class A
B. Class B
C. Class C
D. Class D

Answer: C

21) UDP packets have fixed-size header of .......... bytes.


A. 16
B. 8
C. 32
D. 64

Answer: B

22) .......... messages are never sent in response to datagrams with a broadcast or a multicast
destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP

Answer: A

23) TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is number of the ....... byte carried in that segment.
A. first
B. last
C. middle
D. zero

Answer: A

24) .......... is responsible for converting the higher level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
Answer: C

25) UDP and TCP are both ......... layer protocols.


A. data link
B. network
C. transport
D. interface

Answer C

26) ........... is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from upper layer.
A. TCP
B. UDP
C. IP
D. ARP

Answer B

27) Which of the following functions does UDP perform?


A. Process-to-process communication
B. Host-to-host communication
C. End-to-end reliable data delivery
D. Interface-to-interface communication.

Answer A

28) A port address in TCP/IP is .........bits long.


A. 32
B. 48
C. 16
D. 64

Answer C

29) When the IP layer of a receiving host receives a datagram, .....


A. delivery is complete
B. a transport layer protocol takes over
C. a header is added
D. a session layer protocol takes over

Answer: B

30) TCP/IP is a .......... hierarchical protocol suite developed before the OSI model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer

Answer: B. five-layer

Fill in the blanks

31. What are the functions of the transport layer ____________


Answer: Multiplexing & De multiplexing

32. Which services are provided by transport layer ____________


Answer: Error Control

33. TCP and UDP are called ________


Answer: Transport Protocols

34. Security based connection is provided by which layer__________


Answer: Transport Layer

35. Using which method in transport layer data integrity can be ensured _______
Answer: Check Sum

36. Buffer overrun can be reduced by using ________


Answer: Flow Control

37. Transport layer can identify the symptoms of overload nodes using _________
Answer: Traffic Control

38. Transport layer receives data in the form of __________


Answer: Byte Streams

39. Congestion control can control traffic entry into a telecommunications network, so to avoid
_________
Answer: Congestive Collapse

40. UDP packets are called as _________


Answer: Datagram’
Unit V

1. Which is not a application layer protocol?


a) HTTP
b) SMTP
c) FTP
d) TCP
Answer: d

2. The packet of information at the application layer is called __________


a) Packet
b) Message
c) Segment
d) Frame
Answer: b

3. Which one of the following is an architecture paradigms?


a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
Answer: d

4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
Answer: c

5. Application layer offers _______ service.


a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
Answer: a

6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c

7. Which of the following is an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Answer: d

8. To deliver a message to the correct application program running on a host, the _______
address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c

9. Transport services available to applications in one or another form _________


a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Answer: d

10. Electronic mail uses which Application layer protocol?


a) SMTP
b) HTTP
c) FTP
d) SIP
Answer: a

11) This is not a application layer protocol


a) HTTP
b) SMTP
c) FTP
d) TCP

Answer:d

12) The packet of information at the application layer is called


a) Packet
b) Message
c) Segment
d) Frame
Answer: b
13) This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b
Answer: d
Explanation: HTTP is a protocol.

14) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Answer: c

15) Application layer offers _______ service


a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
Answer: a

16) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.

17) Pick the odd one out


a) File transfer
b) File download
c) E-mail
d) Interactive games
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
18) Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned

19) To deliver a message to the correct application program running on a host, the _______
address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c

20) This is a time-sensitive service


a) File transfer
b) File download
c) E-mail
d) Internet telephony
Answer: d

21) Transport services available to applications in one or another form


a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Answer: d

22) Electronic mail uses this Application layer protocol


a) SMTP
b) HTTP
c) FTP
d) SIP
Answer: a
23. The entire hostname has a maximum of
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters

24. A DNS client is called


a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
View Answer Answer:b

25Servers handle requests for other domains


a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
Answer:b
Explanation:None.

26) DNS database contains


a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Answer:d
Explanation:None.

27. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer:a

28) Which one of the following allows client to update their DNS entry as their IP address
change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer:a

29. Wildcard domain names start with label


a) @
b) *
c) &
d) #
Answer:b

30) The right to use a domain name is delegated by domain name registers which are accredited
by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer:d

Fill in the blanks

31. The ____________ translates internet domain and host names to IP address.
Answer: Domain name system

32. Which one of the following allows a user at one site to establish a connection to another site
and then pass keystrokes from local host to remote host _________
Answer: telnet

33. Application layer protocol defines ____________


Answer: Syntax and semantics

34. Which one of the following protocol delivers/stores mail to receiver server _______
Answer: Simple mail transfer protocol

35. The ASCII encoding of binary data is __________--


Answer: 64 Encoding

36. ___________ is an internet standard protocol for managing devices on IP network


Answer: Simple network management protocol

37. _____________ is the following is not an application layer protocol


Answer: resource reservation protocol

38. ______________ is a signaling communication protocol used for controlling multimedia


communication sessions
Answer: session initiation protocol
39. When displaying a web page, the application layer uses the _____________
Answer: HTTP protocol
40. DNS stands for _________ Answer: Domain Name System

You might also like