Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : Which is a time-sensitive service? A. File transfer B. File download C. E-mail D. Internet telephony
Last Answer : D. Internet telephony
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server
Last Answer : A. electronic mail, server (storage)
Description : Which of the following is/are the important applications of the application layer? a.Electronic mail b.World Wide Web c.USENET d.All of the above
Last Answer : d.All of the above
Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP
Last Answer : A. SMTP
Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application
Last Answer : b. Host to host
Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
Last Answer : Layer 7 protocols
Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP
Last Answer : c. UDP, TCP, UDP and TCP
Description : The service access points in Session Layer are called ________________ A. Accessing point B. activation point C. Session Service Access Points D. both a and b
Last Answer : C. Session Service Access Points
Description : The Application layer offers _______ service. A. End to end B. Process to process C. Both End to end and Process to process D. None of the mentioned
Last Answer : A. End to end
Description : Error Control is an application layer service? True False
Last Answer : False
Last Answer : Well it may take a while or turn to tech. support or reseller. ☠ ☠ ☣ ☠ ☣ ☠ ☣ ☠ ☢
Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP
Last Answer : c. TCP
Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned
Last Answer : REST stands for Representational State Transfer
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer
Last Answer : b. media access control sublayer
Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer
Last Answer : c. Both A and B
Description : The portion of physical layer that interfaces with the media access control sublayer is called ___________ a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. physical transport sublayer
Last Answer : a. physical signalling sublayer
Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link
Last Answer : B. physical, data link, network
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer
Last Answer : B. media access control sublayer
Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id
Last Answer : b. content-transfer-encoding
Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above
Last Answer : c. Both a & b
Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.
Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization
Last Answer : Application virtualization
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above
Last Answer : D. All of the Above
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method
Last Answer : Random access memory
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Last Answer : C) ii, iii and iv only
Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above
Last Answer : d. All the above
Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP
Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer
Last Answer : a. logical link control sublayer
Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer
Last Answer : A. logical link control sublayer
Description : Transmission media lie below the_______ layer. A) physical B) network C) transport D) application
Last Answer : physical
Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer
Last Answer : b. Session Layer
Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above
Last Answer : D) All of the above
Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) Application
Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol
Last Answer : d. Session Initiation Protocol
Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only
Last Answer : c. (ii) and (iv) only
Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned
Last Answer : d.all of the mentioned
Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer
Last Answer : a.application layer
Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer
Last Answer : a.Application layer
Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application
Last Answer : d.application
Description : The TCP/IP …………corresponds to the combined session, presentation, and application layers of the OSI model. a.session layer b.presentation layer c.application layer d.None of the above
Last Answer : c.application layer