FTP server listens to connections on port …………………….
A) 19 and 20
B) 20 and 21
C) 21 and 22
D) 20 and 22

1 Answer

Answer :

B) 20 and 21

Related questions

Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22

Last Answer : B) 20 and 21

Description : FTP server listens for connection on which port number? a) 18 b) 21 c) 22 d) 26

Last Answer : b) 21

Description : FTP server listens for connection on port number A. 20 B. 21 C. 22 D. 23

Last Answer : B. 21

Description : In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection A. 21; 22 B. 21; 20 C. 20; 21 D. none of the above

Last Answer : B. 21; 20

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : Compare Server based network and peer-to-peer network.

Last Answer : Compare Server based network & Peer to Peer network Server based network Peer to Peer 1. It is much like company uses centralized management. 1. It is much like company uses ... 7.It support small Network 8.Better performance 8.Might hurt user's performance

Description : Define Server. Give the name of any two types of Server.

Last Answer : Definition of server: The central computer which is more powerful than the clients & which allows the clients to access its software & database is called as the server. Types of server: 1. File server 2. Print Sever 3. Application server 4. Message server 5. Database server

Description : Redirect all internet connections to one website?

Last Answer : Yes, it’s a “man in the middle attack”, you can do almost anything. Replace websites, do phishing… or better yet just prank people and tell them to patch their holes :)

Description : port number does FTP use? A. 21 B. 25 C. 23 D. 80

Last Answer : A. 21

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Which of the following are known as the short circuit parameters of a 2- port network? (A) Z- parameters. (B) H- parameters. (C) Y- parameters. (D) A,B,C,D, parameters.

Last Answer : Which of the following are known as the short circuit parameters of a 2- port network? (A) Z- parameters. (B) H- parameters. (C) Y- parameters. (D) A,B,C,D, parameters.

Description : A Two-Port Network is said to be symmetrical when the following equalities hold good (A) Z11 = Z22 and Z12 = Z21 (B) Z11 = Z22 (C) Y12 = Y21 (D) Y11 = Y22 and Y12 = Y21

Last Answer : A Two-Port Network is said to be symmetrical when the following equalities hold good Z11 = Z22

Description : Due to the party politics Muhammad Bin Qasim died at the age of: A. 19 B. 20 C. 21 D. 22

Last Answer : ANSWER: B

Description : When a Proclamation of Emergency is in operation, the right to move a Court for the enforcement of all Fundamental Rights remains suspended, except - (1) Article 20 and Article 21 (2) Article 21 and Article 22 (3) Article 19 and Article 20 (4) Article 25 and Article 16

Last Answer : (1) Article 20 and Article 21 Explanation: Indian constitution Article 359 of the Constitution authorizes the President of India to suspend the right to move any court for the enforcement of Fundamental Rights during National Emergency except Article 20 and Article 21.

Description : Which of the following Articles cannot be suspended during the national emergency? (1) Articles 14 and 15 (2) Articles 19 and 20 (3) Articles 21 and 22 (4) Articles 20 and 21

Last Answer : (4) Articles 20 and 21 Explanation: Article 20 and 21 cannot be suspended during national emergency.

Description : Indian constitution provides protection to the life and liberty of citizens as well as non citizens by a) Art. 20 b) Art. 21 c) Art. 22 d) Art. 19

Last Answer : b) Art. 21

Description : Three consecutive numbers such that twice the first, 3 times the second and 4 times the third together make 182. The numbers in question are 1. 18, 22 and 23 2. 18, 19 and 20 3. 19, 20 and 21 4. 20, 21 and 22 5. 21, 22 and 23

Last Answer : Answer- 3( 19,20,21) Explanation:- let number be x,x+1,x+2 2x + 3(x+1)+4(x+2)=180 x=19 so numbers are 19,20,21

Description : The average age of A and B is 20 years. If C were to replace A, the average would be 19 and id C were to replace B,the average would be 21 . The ages of A, B and C are (in years) (a) 22, 17,16 (b) 22, 18, 20 (c) 30, 18, 15 (d) 23, 17 ,15

Last Answer : 22, 18, 20 Hint : A + B = 2 x 20 C + B = 2 x 19 A + C = 2 x 21

Description : f the temperature falls below 18 degrees, the heating is switched on. When the temperature reaches 21 degrees, the heating is switched off. What is the minimum set of test input values to cover all valid equivalence ... 17, 18, 20 and 21 degrees C. 18, 20 and 22 degrees D. 16 and 26 degrees

Last Answer : A. 15, 19 and 25 degrees

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only