1) STUB is a technique utilized in the client-server operation especially for implementation of __________
a. RPC
b. RTP
c. RTCP
d. All of the above
|
2) Which DNS client maps an address to a name or a name to an address especially when required by a host?
a. Resolver
b. Mapper
c. Primary Server
d. Secondary Server
|
3) Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features?
a. TCP
b. LDAP
c. FTP
d. None of the above
|
4) Which intermediaries are more likely to get involved during the transfer function of an e-mail system?
a. Storage and forwarding of e-mail for certain addresses
b. Act as gateways to other e-mail or messaging systems
c. Both a & b
d. None of the above
|
5) Which among the below specified illustrations belongs to the category of GUI based user agents?
a. Mail
b. Pine
c. Outlook & Netscape
d. All of the above
|
6) Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose?
a. Authorization Phase
b. Transaction Phase
c. Update Phase
d. All of the above
|
7) Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections?
a. Reduction in latency over the sub-sequent requests b. Pipeline-oriented connection over the requests and responses c. Increase in number of packets due to TCP opens d. Prevention in opening and closing of some TCP connections
a. A & B
b. C & D
c. A & C
d. B & D
|
8) Which URL method of HTTP performs similar function as that of PUT method only with an exception of request comprising a list of differences that exhibit the necessity to get implemented in the existing file?
a. POST
b. GET
c. PATCH
d. OPTION
|
9) Which language in WWW specifies a web's way by describing three-dimensional objects?
a. HTML
b. VRML
c. XML
d. UML
|
10) Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree?
a. Domain
b. Path
c. Content
d. Secure
|
11) Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking?
a. BOOTP
b. DHCP
c. Both a & b
d. None of the above
|
12) What is/are the major role/s of Data Link Layer (DLL) in an OSI model?
a. Detection & Correction of transmission errors b. Provision of data flow control to prevent DTE from overburdening c. Identification of various devices on the network d. Generation of a frame for easy data transfer
a. A, B, C & D
b. Only C
c. Only D
d. None of the above
|
13) Which OSI layer allows the transmission and reception of data segments to a session layer in addition to the provision of flow control, sequence numbering and message acknowledgment?
a. Network Layer
b. Session Layer
c. Transport Layer
d. Application Layer
|
14) Which network component/s is/are involved in the Presentation layer of an OSI model?
a. Gateway
b. Multiplexer & Oscilloscope
c. Amplifier & Hub
d. All of the above
|
15) Which is the only layer of OSI model that prevents itself from adding its own header to the data during the data transmission process?
a. Application layer
b. Network layer
c. Physical layer
d. None of the above
|
16) Which protocol/s is/are used in data link layer of an OSI model?
a. SMB
b. NCP
c. LLC
d. All of the above
|
17) Which among the four layers of TCP/IP is analogous to the physical and the data link layers of an OSI model?
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Host to network Layer
|
18) Which combinational package of layers in OSI model is equivalent to an application layer of TCP/ IP model?
a. Transport, Session & Application Layers
b. Session, Presentation & Application Layers
c. Data Link, Transport & Presentation Layers
d. Network, Session & Application Layers
|
19) Which protocol of TCP/IP exhibits its usability in applications requiring instant and essentially reliable delivery operations?
a. Transmission Control Protocol (TCP)
b. User Datagram Protocol (UDP)
c. Internet Protocol (IP)
d. File Transfer Protocol (FTP)
|
20) Which protocol assists in providing the remote login access over the network especially in an application layer of TCP/IP reference model?
a. File Transfer Protocol (FTP)
b. Simple Network Management Protocol (SNMP)
c. Simple Mail Transfer Protocol (SMTP)
d. TELNET (Network Terminal Protocol)
|
21) Consider the following assertions. Which of them is/are incorrect in accordance to functions associated with TCP in transport layer?
a. Conversion of an incoming byte stream into discrete message b. Synchronization occurs between the fast sender and the slow receiver c. It is widely applicable in prompt delivery d. It allows an error-less byte stream to get delivered to a specified location
a. A & B
b. C & D
c. Only A
d. Only C
|
22) Addressing is the service offered by the Internet Protocol(IP), which basically deals with ___________
a. the provision of sequencing the datagrams
b. the determination of route in order to deliver data to the destination host
c. the handling of large messages in an intervening network
d. All of the above
Answer
Explanation
Related Ques
|
ANSWER: the determination of route in order to deliver data to the destination host
Explanation: No explanation is available for this question!
|
|
23) Which unique internet address is/are of greater significance during the attachment of a header to the datagram by the Internet Protocol (IP)?
a. Source Address
b. Destination Address
c. Both a & b
d. None of the above
|
24) Which among the below specified network associated components is/are not involved in the host-to-network layer of TCP/IP model?
a. Protocols
b. Device Drivers
c. Network Interface Card
d. All of the above
|
25) Which addresses are related to the processes involved in an application layer of TCP/IP architecture?
a. Physical (Link) Addresses
b. Logical (IP) Addresses
c. Port Addresses
d. Specific Addresses
|
26) An Universal Address System is essential in logical addresses in order to identify each host in completely unique manner irrespective of underlying _______
a. Physical networks
b. Internet protocols
c. Processes in an application layer
d. All of the above
|
27) Which addresses are supposed to be of greater importance for transmitting the data from source to destination?
a. Physical address
b. IP address
c. Both a & b
d. None of the above
|
28) The port address in TCP/IP architecture basically involves ______
a. Label assigning to a process
b. Changing of physical address from hop to hop
c. Encapsulation of data in a frame
d. All of the above
|
29) How does the crosstalk generated due to the electromagnetic interference between two copper wires placed in vicinity get reduced?
a. By twisting the copper wire
b. By using the repeaters
c. By using amplifiers
d. All of the above
|
30) Which category of UTP cable in accordance to the EIA standard exhibits the capability of three twist per foot in addition to the transmission speed of about 16 Mbps?
a. Category 5
b. Category 4
c. Category 3
d. Category 2
|
31) Which mode of coaxial cable represents the cable bandwidth by a single stream of data during the transmission of any data/information?
a. Baseband mode
b. Broadband mode
c. Passband mode
d. None of the above
|
32) The data transfer rate of any co-axial cable usually occurs or lies _______
a. Between TP and fiber optic cables
b. Between STP and UTP cables
c. Both a & b
d. None of the above
|