

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
351. |
Sniffers can be prevented by using _______________ |
A. | wired environment |
B. | wifi |
C. | ethernet lan |
D. | switched network |
Answer» D. switched network |
352. |
Firewalls are often configured to block ___________ |
A. | udp traffic |
B. | tcp traffic |
C. | sensitive traffic |
D. | best-effort traffic |
Answer» A. udp traffic |
353. |
UTP is commonly used in __________ |
A. | dsl |
B. | fttp |
C. | http |
D. | none of the mentioned |
Answer» A. dsl |
354. |
Terrestrial radio channels are broadly classifed into _____ groups. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 1 |
Answer» B. 3 |
355. |
A local telephone network is an example of a _______ network. |
A. | packet switched |
B. | circuit switched |
C. | bit switched |
D. | line switched |
Answer» B. circuit switched |
356. |
Most packet switches use this principle ____________ |
A. | stop and wait |
B. | store and forward |
C. | store and wait |
D. | stop and forward |
Answer» B. store and forward |
357. |
What are the Methods to move data through a network of links and switches? |
A. | packet switching and line switching |
B. | circuit switching and line switching |
C. | line switching and bit switching |
D. | packet switching and circuit switching |
Answer» D. packet switching and circuit switching |
358. |
In _________ systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» A. packet switching |
359. |
Which of the following is not an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | error control |
Answer» D. error control |
360. |
Which is not a application layer protocol? |
A. | http |
B. | smtp |
C. | ftp |
D. | tcp |
Answer» D. tcp |
361. |
The packet of information at the application layer is called __________ |
A. | packet |
B. | message |
C. | segment |
D. | frame |
Answer» B. message |
362. |
Which one of the following is an architecture paradigms? |
A. | peer to peer |
B. | client-server |
C. | http |
D. | both peer-to-peer & client-server |
Answer» D. both peer-to-peer & client-server |
363. |
Application layer offers _______ service. |
A. | end to end |
B. | process to process |
C. | both end to end and process to process |
D. | none of the mentioned |
Answer» A. end to end |
364. |
E-mail is _________ |
A. | loss-tolerant application |
B. | bandwidth-sensitive application |
C. | elastic application |
D. | none of the mentioned |
Answer» C. elastic application |
365. |
Pick the odd one out. |
A. | file transfer |
B. | file download |
C. | |
D. | interactive games |
Answer» D. interactive games |
366. |
Which of the following is an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | all of the mentioned |
Answer» D. all of the mentioned |
367. |
Which is a time-sensitive service? |
A. | file transfer |
B. | file download |
C. | |
D. | internet telephony |
Answer» D. internet telephony |
368. |
Transport services available to applications in one or another form _________ |
A. | reliable data transfer |
B. | timing |
C. | security |
D. | all of the mentioned |
Answer» D. all of the mentioned |
369. |
Electronic mail uses which Application layer protocol? |
A. | smtp |
B. | http |
C. | ftp |
D. | sip |
Answer» A. smtp |
370. |
The ____________ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
371. |
Application layer protocol defines ____________ |
A. | types of messages exchanged |
B. | message format, syntax and semantics |
C. | rules for when and how processes send and respond to messages |
D. | all of the mentioned |
Answer» D. all of the mentioned |
372. |
When displaying a web page, the application layer uses the _____________ |
A. | http protocol |
B. | ftp protocol |
C. | smtp protocol |
D. | tcp protocol |
Answer» A. http protocol |
373. |
The default connection type used by HTTP is _________ |
A. | persistent |
B. | non-persistent |
C. | can be either persistent or non-persistent depending on connection request |
D. | none of the mentioned |
Answer» A. persistent |
374. |
The HTTP request message is sent in _________ part of three-way handshake. |
A. | first |
B. | second |
C. | third |
D. | fourth |
Answer» C. third |
375. |
The first line of HTTP request message is called _____________ |
A. | request line |
B. | header line |
C. | status line |
D. | entity line |
Answer» A. request line |
376. |
The __________ method when used in the method field, leaves entity body empty. |
A. | post |
B. | send |
C. | get |
D. | put |
Answer» C. get |
377. |
Which of the following is not correct? |
A. | web cache doesnt has its own disk space |
B. | web cache can act both like server and client |
C. | web cache might reduce the response time |
D. | web cache contains copies of recently requested objects |
Answer» A. web cache doesnt has its own disk space |
378. |
HTTP is ________ protocol. |
A. | application layer |
B. | transport layer |
C. | network layer |
D. | data link layer |
Answer» A. application layer |
379. |
In the network HTTP resources are located by |
A. | uniform resource identifier |
B. | unique resource locator |
C. | unique resource identifier |
D. | union resource locator |
Answer» A. uniform resource identifier |
380. |
FTP server listens for connection on port number ____________ |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» B. 21 |
381. |
The File Transfer Protocol is built on ______________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» C. client server architecture |
382. |
In File Transfer Protocol, data transfer cannot be done in ___________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» D. message mode |
383. |
Expansion of FTP is __________ |
A. | fine transfer protocol |
B. | file transfer protocol |
C. | first transfer protocol |
D. | fast transfer protocol |
Answer» B. file transfer protocol |
384. |
FTP is built on _____ architecture. |
A. | client-server |
B. | p2p |
C. | data centric |
D. | service oriented |
Answer» A. client-server |
385. |
FTP uses _________ parallel TCP connections to transfer a file. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
386. |
Identify the incorrect statement regarding FTP. |
A. | ftp stands for file transfer protocol |
B. | ftp uses two parallel tcp connections |
C. | ftp sends its control information in-band |
D. | ftp sends exactly one file over the data connection |
Answer» C. ftp sends its control information in-band |
387. |
FTP server _____________ |
A. | maintains state information |
B. | is stateless |
C. | has single tcp connection for a file transfer |
D. | has udp connection for file transfer |
Answer» A. maintains state information |
388. |
Find the FTP reply whose message is wrongly matched. |
A. | 331 – username ok, password required |
B. | 425 – can’t open data connection |
C. | 452 – error writing file |
D. | 452 – can’t open data connection |
Answer» D. 452 – can’t open data connection |
389. |
The password is sent to the server using ________ command |
A. | passwd |
B. | pass |
C. | password |
D. | pword |
Answer» B. pass |
390. |
When the mail server sends mail to other mail servers it becomes ____________ |
A. | smtp server |
B. | smtp client |
C. | peer |
D. | master |
Answer» B. smtp client |
391. |
If you have to send multimedia data over SMTP it has to be encoded into _______ |
A. | binary |
B. | signal |
C. | ascii |
D. | hash |
Answer» C. ascii |
392. |
The underlying Transport layer protocol used by SMTP is ________ |
A. | tcp |
B. | udp |
C. | either tcp or udp |
D. | imap |
Answer» A. tcp |
393. |
Choose the statement which is wrong incase of SMTP? |
A. | it requires message to be in 7bit ascii format |
B. | it is a pull protocol |
C. | it transfers files from one mail server to another mail server |
D. | smtp is responsible for the transmission of the mail through the internet |
Answer» B. it is a pull protocol |
394. |
Internet mail places each object in _________ |
A. | separate messages for each object |
B. | one message |
C. | varies with number of objects |
D. | multiple messages for each object |
Answer» B. one message |
395. |
Typically the TCP port used by SMTP is _________ |
A. | 25 |
B. | 35 |
C. | 50 |
D. | 15 |
Answer» A. 25 |
396. |
A session may include ________ |
A. | zero or more smtp transactions |
B. | exactly one smtp transactions |
C. | always more than one smtp transactions |
D. | number of smtp transactions cant be determined |
Answer» A. zero or more smtp transactions |
397. |
Which of the following is an example of user agents for e-mail? |
A. | microsoft outlook |
B. | |
C. | |
D. | tumblr |
Answer» A. microsoft outlook |
398. |
User agent does not support this ___________ |
A. | composing messages |
B. | reading messages |
C. | replying messages |
D. | routing messages |
Answer» D. routing messages |
399. |
SMTP connections secured by SSL are known as _____________ |
A. | smtps |
B. | ssmtp |
C. | snmp |
D. | starttls |
Answer» A. smtps |
400. |
SMTP uses which of the following TCP port? |
A. | 22 |
B. | 23 |
C. | 21 |
D. | 25 |
Answer» D. 25 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.