Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above
Last Answer : b. LDAP
Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack
Last Answer : d. SQL Injection attack
Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP
Last Answer : A) Telnet
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP
Last Answer : c. TCP
Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol
Last Answer : A. HTTP protocol
Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP
Last Answer : b) TCP
Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA
Last Answer : b. FTP
Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP
Last Answer : A. TCP/IP
Description : Which among the following standard protocols is the most widely used by the Internet ? (1) HTTP (2) TCP/IP (3) SMTP (4) SLIP
Last Answer : TCP/IP
Description : The ……… protocol is based on end-to- end delivery. a. SMTP b. TCP c. IP d. SCTP
Last Answer : a. SMTP
Description : The ______ protocol is based on end-to-end delivery. A. SCTP B. TCP C. SMTP D. SCTP
Last Answer : C. SMTP
Description : Which of the following is not a internet protocol: a) STP b) HTTP c) FTP d) None of These
Last Answer : a) STP
Description : HTTP expands? A. Hyper Text Transfer Protocol B. Hyper Terminal Transfer Protocol C. Hyper Text Terminal Protoco
Last Answer : A. Hyper Text Transfer Protocol
Description : Which protocol is lightweight? A. MQTT B. HTTP C. CoAP D. SPI
Last Answer : A. MQTT
Description : Which protocol is lightweight? a) MQTT b) HTTP c) CoAP
Last Answer : a) MQTT
Description : MQTT is _________ protocol. a) Machine to Machine b) Internet of Things c) Machine to Machine and Internet of Things d) Machine things
Last Answer : c) Machine to Machine and Internet of Things
Description : Correct expansion of the term ‘http’ in Internet address is (1) higher text transfer protocol (2) higher transfer text protocol (3) hybrid text transfer protocol (4) hypertext transfer protocol
Last Answer : hypertext transfer protocol
Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned
Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content
Description : TCP stands for: a) Tools Control Protocol b) Transmission Control Protocol c) Transfer Control Protocol d) None of These
Last Answer : b) Transmission Control Protocol
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only
Last Answer : D) All i, ii, iii, iv and v only
Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer
Last Answer : B) Session Layer
Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : What is the full form of TCP : a. Transmission Control Protocol b. Transfer Control Protocol c. Travel Control Protocol d. Tracking Control Protocol
Last Answer : a. Transmission Control Protocol
Description : TCP stand for……… a. Transmission Control Protocol b. Transfer Control Protocol c. Travel Control Protocol d. Tracking Control Protocol
Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol
Last Answer : c. ARP protocol
Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only
Last Answer : c. (ii) and (iv) only
Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP
Last Answer : a. HTTP, FTP
Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3
Last Answer : a. 4,2,1,3
Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP
Last Answer : c.Telnet
Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B
Last Answer : a. A & B
Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP
Last Answer : c. TCP and UDP
Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP
Last Answer : C. TCP and UDP
Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP
Last Answer : c) TCP and UDP
Description : What is the protocol called that defines how a client can access information perform operations and share directory data on a directory sever?
Last Answer : LDAP (Lightweight Directory Access Protocol)
Description : What's the better, NIS/YP or LDAP for central login?
Last Answer : answer:Go with ldap NIS isn’t very manageable or secure.
Description : What is the best LDAP structure when you want users being part of multiple groups?
Last Answer : I would ask this question here: http://superuser.com
Description : A database of information that is maintained by human editors and lists websites by category and subcategory with categorization is known as: 1. A search directory 2. Automated voice response (AVR) 3. Apps 4. Search Engine Optimization (SEO
Last Answer : A search directory
Description : In URL http://www.cbse.nic.in/ is a …………. protocol. -Technology
Last Answer : In URL http://www.cbse.nic.in/ is a http protocol.
Description : HTTP stands fora. Hyper text transfer parameter b.High transmission tool protocol c. Hyper text transfer protocol d. Hyper test transmission permission
Last Answer : c. Hyper text transfer protocol
Description : HTTP stands for a. Hyper text transfer parameter b.High transmission tool protocol c. Hyper text transfer protocol d. Hyper test transmission permission
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP
Last Answer : c. DNS
Description : HTTP stands for? a. Hyper terminal tracing program b. Hypertext tracing protocol c. Hypertext transfer protocol d. Hypertext transfer program
Last Answer : c. Hypertext transfer protocol
Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP
Last Answer : A. SMTP