Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Explain following: I. Telnet II. FTP
Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection.
Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP
Last Answer : c.Telnet
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Last Answer : A) FTP
Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP
Last Answer : A) Telnet
Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22
Last Answer : B) 20 and 21
Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe
Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc
Last Answer : telnet
Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : Bus
Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session
Last Answer : B) Application
Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These
Last Answer : a) Telnet
Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above
Last Answer : c) Instant Message
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol
Last Answer : A) SSL handshake protocol
Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding
Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer
Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper
Last Answer : A)Domain Name System
Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP
Last Answer : c. DNS
Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet
Last Answer : A. DNS
Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned
Last Answer : REST stands for Representational State Transfer
Description : Distinguish between FTP and Telnet. -Technology
Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.
Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these
Last Answer : Telnet
Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP
Last Answer : d. SMTP
Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP
Last Answer : a. HTTP, FTP
Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer
Last Answer : d. Application layer
Description : Which protocol is commonly used to retrieve email from a mail server? a) FTP b) IMAP c) HTML d) TELNET
Last Answer : b) IMAP
Description : In which layer Telnet and FTP works? a. Application b. Session c. Network d. Physical
Last Answer : In which layer Telnet and FTP works? a. Application b. Session c. Network d. Physical
Description : State maximum power transfer theorem.
Last Answer : The maximum power transfer theorem states that the maximum amount of power will be delivered to the load resistance when the load resistance is equal to the Thevenin/ Norton resistance of the network supplying the power ... draws maximum power. Also find the value of the maximum power.
Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC
Last Answer : Modem
Last Answer : C) ii, iii and iv only
Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA
Last Answer : b. FTP
Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?
Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.
Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these
Last Answer : b) Microsoft Outlook
Description : Which of the following would you use to transfer files over the Internet? (a) FTP (b) E_mail -Technology
Last Answer : (a) FTP is used to transfer files between computer on a network.
Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway
Last Answer : A) Tunnel
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False
Last Answer : A) True, False
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Last Answer : C) 443
Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : C) SSL record protocol
Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN
Last Answer : B) VPN
Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True