While initiating SSL session, the client code recognizes the SSL request and establishes a connection  through TCP Part …………….. to the SSL code on the server.
A) 420
B) 1032
C) 443
D) 322

1 Answer

Answer :

C) 443

Related questions

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120

Last Answer : C. 220

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP

Last Answer : Answer: 1

Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : B) i-True, ii-True

Description : A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second). (A) 133.33 m sec (B) 266.67 m sec (C) 400.00 m sec (D) 533.33 m sec

Last Answer : (D) 533.33 m sec Explanation: The request has to go up and down, and the response has to go up and down. The total path length traversed is thus 160.000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec. 

Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? (A) Session Maintenance Protocol (B) Real - time Streaming Protocol (C) Real - time Transport Control Protocol (D) Session Initiation Protocol

Last Answer : (D) Session Initiation Protocol

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : What is the main function of Session layer in OSI model? a. Defines how data is formatted between the devices b. Made physical connection between server and client c. Both a and b d. None of the above

Last Answer : a. Defines how data is formatted between the devices

Description :  _____ is a bi-directional, fully duplex communication model that uses a persistent connection between client and server. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair

Last Answer : D. Exclusive Pair 

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus

Last Answer : A) Trap doors

Description : If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are: 98, 37, 14, 124, 65, 67 (A) 320 (B) 322 (C) 321 (D) 319

Last Answer : (C) 321

Description : State whether true or false. i) init( ) of servlet is called after a client request comes in ii) Servlets are ultimately converted into JSP A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true

Last Answer : A) i-false, ii-false

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All

Last Answer : D) All

Description : A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : D) transkie

Description : Which one of the following is not a Client-Server application ? (A) Internet chat (B) Web browser (C) E-mail (D) Ping 

Last Answer : (B) Web browser

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

Last Answer : DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server. ... the answer exceeds 512 bytes and both client and server support EDNS, larger UDP packets are used.

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : In order to run JSP .................... is required. A) Mail Server B) Applet viewer C) Java Web Server D) Database connection

Last Answer : C) Java Web Server

Description :  ___ is a stateful communication model and server is aware of all open connection. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair

Last Answer : D. Exclusive Pair 

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : The ____ layer establishes, maintains, and synchronizes the interaction between communicating systems. a. network b. transport c. session d. presentation

Last Answer : c. session

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : A CPA establishes quality control policies and procedures for deciding whether to accept a new client or continue to perform services for a current client. The primary purpose ... resulting from failure to detect irregularities in client financial statements association with clients whose

Last Answer : To minimize the likelihood of association with clients whose management lacks integrity

Description : Match the following HTTP status code to their respective definitions. i) 400 a) OK ii) 500 b) Not found iii) 200 c) Continue iv) 100 d) Internal server error A) i-b, ii-d, iii-a, iv-c B) i-a, ii-b, iii-c, iv-d C) i-b, ii-c, iii-a, iv-d D) i-b, ii-a, iii-c, iv-d

Last Answer : A) i-b, ii-d, iii-a, iv-c

Description : Match the following HTTP status code to their respective definitions. i) 400 a) OK ii) 500 b) Not found iii) 200 c) Continue iv) 100 d) Internal server error A) i-b, ii-d, iii-a, iv-c B) i-a, ii-b, iii-c, iv-d C) i-b, ii-c, iii-a, iv-d D) i-b, ii-a, iii-c, iv-d

Last Answer : A) i-b, ii-d, iii-a, iv-c

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP