Which of the following is an application
layer service?
a. Remote log-in
b. File transfer and access
c. Mail service
d. All of the above

1 Answer

Answer :

d. All of the above

Related questions

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which is a time-sensitive service? A. File transfer B. File download C. E-mail D. Internet telephony

Last Answer : D. Internet telephony

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : Which of the following is/are the important applications of the application layer? a.Electronic mail b.World Wide Web c.USENET d.All of the above

Last Answer : d.All of the above

Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP

Last Answer : A. SMTP

Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application

Last Answer : b. Host to host

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : The service access points in Session Layer are called ________________ A. Accessing point B. activation point C. Session Service Access Points D. both a and b

Last Answer : C. Session Service Access Points

Description : The Application layer offers _______ service. A. End to end B. Process to process C. Both End to end and Process to process D. None of the mentioned

Last Answer : A. End to end

Description : Error Control is an application layer service? True False

Last Answer : False

Last Answer : Well it may take a while or turn to tech. support or reseller. ☠ ☠ ☣ ☠ ☣ ☠ ☣ ☠ ☢

Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP

Last Answer : c. TCP

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer

Last Answer : c. Both A and B

Description : The portion of physical layer that interfaces with the media access control sublayer is called ___________ a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. physical transport sublayer

Last Answer : a. physical signalling sublayer

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?

Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Last Answer : D. All of the Above

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above

Last Answer : d. All the above

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : Transmission media lie below the_______ layer. A) physical B) network C) transport D) application

Last Answer : physical

Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer

Last Answer : b. Session Layer

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer

Last Answer : a.application layer

Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer

Last Answer : a.Application layer

Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application

Last Answer : d.application

Description : The TCP/IP …………corresponds to the combined session, presentation, and application layers of the OSI model. a.session layer b.presentation layer c.application layer d.None of the above

Last Answer : c.application layer