APPLICATION LAYER MCQ || COMPUTER NETWORK
A) Data Link
B) Session
C) Presentation
D) Provide network services to end-users
Answer: D) Provide network services to end-users
A) TCP
B) HTTP
C) IP
D) ICMP
Answer: B) HTTP
A) Simple Mail Transfer Protocol
B) Secure Multimedia Transmission Protocol
C) Server Mail Transfer Protocol
D) System Message Transmission Protocol
Answer: A) Simple Mail Transfer Protocol
A) FTP
B) SNMP
C) DNS
D) DHCP
Answer: A) FTP
A) File transfer
B) Web page retrieval
C) Email communication
D) Remote login
Answer: B) Web page retrieval
A) SMTP
B) UDP
C) HTTP
D) POP3
Answer: B) UDP
A) Dynamic Network Services
B) Domain Name System
C) Distributed Naming Service
D) Data Networking Security
Answer: B) Domain Name System
A) HTTP
B) FTP
C) SIP
D) SNMP
Answer: C) SIP (Session Initiation Protocol)
A) Application Programming Interface
B) Advanced Protocol Interaction
C) Automated Program Invocation
D) Application Processing Interface
Answer: A) Application Programming Interface
A) Ensuring reliable data transfer
B) Providing encryption and compression
C) Managing sessions between applications
D) Establishing network connections
Answer: B) Providing encryption and compression
Web (HTTP & HTTPS),
File Transfer (FTP, PuTTY, Win SCP),
A) File Transfer Protocol
B) Fast Text Processing
C) Forwarding Transmission Protocol
D) File Type Placeholder
Answer: A) File Transfer Protocol
A) 20
B) 21
C) 22
D) 23
Answer: A) 20
A) Video Conferencing
B) Secure Shell (SSH) and Telnet
C) File Transfer Protocol (FTP)
D) Voice over Internet Protocol (VoIP)
Answer: B) Secure Shell (SSH) and Telnet
A) PuTTY
B) WinSCP
C) FileZilla
D) Tera Term
Answer: B) WinSCP
A) Secure File Transfer Protocol
B) Simple File Transfer Protocol
C) Speedy File Transfer Protocol
D) Standard File Transfer Protocol
Answer: A) Secure File Transfer Protocol
A) 20
B) 21
C) 22
D) 23
Answer: C) 22
A) FTP
B) SCP
C) SFTP
D) HTTP
Answer: C) SFTP
A) PuTTYgen
B) PuTTYKey
C) PuTTYSSH
D) PuTTYSecure
Answer: A) PuTTYgen
A) Secure Shell (SSH) connections
B) Graphical file management
C) Simple File Transfer Protocol (SFTP) transfers
D) Telnet sessions
Answer: A) Secure Shell (SSH) connections
A) Username and password
B) Public key authentication
C) Biometric authentication
D) MAC address authentication
Answer: B) Public key authentication
Electronic Mail,
A) Simple Mail Transfer Protocol
B) Secure Mail Transmission Process
C) Server Mail Transfer Protocol
D) System Message Transfer Process
Answer: A) Simple Mail Transfer Protocol
A) SMTP
B) POP3
C) IMAP
D) HTTP
Answer: B) POP3 (Post Office Protocol 3)
A) Managing email accounts
B) Encrypting email content
C) Defining multimedia content types
D) Controlling spam messages
Answer: C) Defining multimedia content types
A) User's username
B) Email server name
C) Email subject
D) Email attachment
Answer: B) Email server name
A) SMTP
B) POP3
C) IMAP
D) HTTP
Answer: C) IMAP (Internet Message Access Protocol)
A) Carbon Copy
B) Copy Control
C) Content Copy
D) Contact Check
Answer: A) Carbon Copy
A) S/MIME
B) BCC
C) SPF
D) TLS
Answer: A) S/MIME (Secure/Multipurpose Internet Mail Extensions)
A) Blind Carbon Copy
B) Bold Content Copy
C) Broadcast Communication Code
D) Base64 Compression Code
Answer: A) Blind Carbon Copy
A) FTP
B) HTTP
C) SMTPS
D) STARTTLS
Answer: C) SMTPS (Secure SMTP)
A) Reply to the sender only
B) Reply to multiple recipients
C) Reply with an attachment
D) Reply with high priority
Answer: B) Reply to multiple recipients
DNS,
A) Encrypting internet traffic
B) Resolving domain names to IP addresses
C) Securing email communication
D) Managing file transfers
Answer: B) Resolving domain names to IP addresses
A) MX (Mail Exchange)
B) NS (Name Server)
C) A (Address)
D) CNAME (Canonical Name)
Answer: C) A (Address)
A) Resolving domain names locally
B) Querying authoritative DNS servers
C) Caching DNS records
D) Assigning IP addresses to devices
Answer: A) Resolving domain names locally
A) A (Address)
B) PTR (Pointer)
C) MX (Mail Exchange)
D) CNAME (Canonical Name)
Answer: C) MX (Mail Exchange)
A) Encrypting DNS traffic
B) Storing DNS configuration information for a domain
C) Mapping domain names to IP addresses
D) Controlling access to DNS servers
Answer: B) Storing DNS configuration information for a domain
A) A (Address)
B) NS (Name Server)
C) PTR (Pointer)
D) SOA (Start of Authority)
Answer: C) PTR (Pointer)
A) Time taken to resolve a domain name
B) Time until the DNS server updates its records
C) Time during which a DNS record is considered valid
D) Time to establish a connection to a DNS server
Answer: C) Time during which a DNS record is considered valid
A) Resolve specific domain names
B) Store domain registration information
C) Manage top-level domains (TLDs)
D) Handle mail exchange requests
Answer: C) Manage top-level domains (TLDs)
A) HTTP
B) FTP
C) UDP (User Datagram Protocol)
D) TCP (Transmission Control Protocol)
Answer: C) UDP (User Datagram Protocol)
A) Specify authoritative DNS servers for the domain
B) Identify the domain's mail exchange servers
C) Define the domain's IP address
D) Set the time-to-live (TTL) for DNS records
Answer: A) Specify authoritative DNS servers for the domain
P2P Applications,
A) Centralized server architecture
B) Hierarchical network structure
C) Distributed sharing of resources
D) Point-to-Point communication
Answer: C) Distributed sharing of resources
A) BitTorrent
B) Skype
C) WhatsApp
D) Dropbox
Answer: A) BitTorrent
A) Initiates the P2P connection
B) Provides initial file chunks to downloaders
C) Manages network routing
D) Encrypts file transfers
Answer: B) Provides initial file chunks to downloaders
A) FTP (File Transfer Protocol)
B) HTTP (Hypertext Transfer Protocol)
C) UDP (User Datagram Protocol)
D) Gnutella Protocol
Answer: D) Gnutella Protocol
A) Encrypting file transfers
B) Indexing and managing shared files
C) Initiating peer-to-peer connections
D) Securing network traffic
Answer: C) Initiating peer-to-peer connections
A) BitTorrent
B) Skype
C) Ares Galaxy
D) eMule
Answer: B) Skype
A) Centralized control
B) Low latency
C) Redundancy
D) Increased number of nodes
Answer: D) Increased number of nodes
A) BitTorrent
B) LimeWire
C) Kazaa
D) BearShare
Answer: C) Kazaa
A) Firewalls
B) Encryption
C) Digital signatures
D) Antivirus software
Answer: B) Encryption
A) High-speed file downloader
B) Initiator of P2P connections
C) User with low upload contribution
D) Seed in a file-sharing network
Answer: C) User with low upload contribution
Socket Programming,
A) A hardware device for data transmission
B) A software interface for file operations
C) An endpoint for sending or receiving data across a computer network
D) A type of firewall for network security
Answer: C) An endpoint for sending or receiving data across a computer network
A) HTTP
B) FTP
C) TCP/IP
D) UDP
Answer: C) TCP/IP
A) Initiating a connection
B) Handling incoming connections
C) Sending data to clients
D) Closing the connection
Answer: B) Handling incoming connections
A) Stream socket
B) Datagram socket
C) Raw socket
D) Sequential socket
Answer: A) Stream socket
A) Initiating a connection
B) Allocating memory for data transfer
C) Associating a socket with a specific address and port
D) Closing the socket
Answer: C) Associating a socket with a specific address and port
A) SO_REUSEADDR
B) SO_KEEPALIVE
C) SO_SNDBUF
D) SO_RCVBUF
Answer: A) SO_REUSEADDR
A) Sending data
B) Receiving data
C) Initiating a connection
D) Marking the socket as passive, ready to accept incoming connections
Answer: D) Marking the socket as passive, ready to accept incoming connections
A) accept
B) connect
C) bind
D) listen
Answer: B) connect
A) Initiates a connection
B) Sends data
C) Waits for an incoming connection and accepts it
D) Closes the connection
Answer: C) Waits for an incoming connection and accepts it
A) TCP
B) UDP
C) IP
D) ICMP
Answer: B) UDP
Application server concept, and
A) Hosting websites
B) Managing databases
C) Executing and managing business logic and applications
D) Controlling network security
Answer: C) Executing and managing business logic and applications
A) Provides only static content
B) Primarily handles file transfers
C) Executes server-side scripts and business logic
D) Manages network routing
Answer: C) Executes server-side scripts and business logic
A) Web servers handle only static content, while application servers handle dynamic content and business logic.
B) Web servers manage databases, while application servers manage file transfers.
C) Web servers focus on security, while application servers focus on network routing.
D) Web servers handle both client-side and server-side scripting, while application servers only handle client-side scripting.
Answer: A) Web servers handle only static content, while application servers handle dynamic content and business logic.
A) Handling client requests and presenting the user interface
B) Managing databases and data storage
C) Executing business logic and application processing
D) Managing network security
Answer: C) Executing business logic and application processing
A) HTTP
B) FTP
C) SMTP
D) TCP
Answer: A) HTTP
A) Managing network connections between servers
B) Storing database connections for reuse, improving performance
C) Controlling access permissions to applications
D) Load balancing for incoming requests
Answer: B) Storing database connections for reuse, improving performance
A) Load balancing
B) Database management
C) Session management
D) HTML rendering
Answer: D) HTML rendering
A) Dividing server resources for better efficiency
B) Combining multiple servers to work as a single logical unit for increased availability and performance
C) Managing network security
D) Executing client-side scripts
Answer: B) Combining multiple servers to work as a single logical unit for increased availability and performance
A) HTML and CSS
B) Java, C#, and Python
C) JavaScript and PHP
D) SQL and PL/SQL
Answer: B) Java, C#, and Python
A) Through direct file transfers
B) Using email communication
C) Via RESTful APIs and network calls
D) Through centralized databases
Answer: C) Via RESTful APIs and network calls
Concept of traffic
analyzer (MRTG, PRTG, SNMP, Packet tracer, Wireshark).
A) Managing network security
B) Analyzing and monitoring network traffic
C) Configuring routers and switches
D) Controlling bandwidth usage
Answer: B) Analyzing and monitoring network traffic
A) HTTP
B) SNMP (Simple Network Management Protocol)
C) ICMP
D) FTP
Answer: B) SNMP (Simple Network Management Protocol)
A) Multi-Router Traffic Grapher
B) Managed Real-Time Graphing
C) Multiple Routing and Traffic Generator
D) Modular Resource Tracking Graph
Answer: A) Multi-Router Traffic Grapher
A) Analyzing packet headers
B) Capturing network traffic
C) Monitoring a specific aspect of a device or network
D) Creating network topologies
Answer: C) Monitoring a specific aspect of a device or network
A) Analyzing network traffic in real-time
B) Simulating and visualizing network configurations and behaviors
C) Monitoring SNMP traps
D) Capturing and decoding packet headers
Answer: B) Simulating and visualizing network configurations and behaviors
A) Application Layer
B) Transport Layer
C) Network Layer
D) Data Link Layer
Answer: D) Data Link Layer
A) Application-layer data
B) Packet headers and payloads
C) Network configurations
D) SNMP traps
Answer: B) Packet headers and payloads
A) Simulating network scenarios
B) Creating network topologies
C) Capturing and analyzing real-time network traffic
D) Monitoring SNMP devices
Answer: C) Capturing and analyzing real-time network traffic
A) Through real-time packet capture
B) Using graphical charts and graphs
C) Through simulated network scenarios
D) With color-coded network maps
Answer: B) Using graphical charts and graphs
A) Analyze packet payloads
B) Simulate network traffic
C) Create custom network maps and dashboards
D) Monitor SNMP devices
Answer: C) Create custom network maps and dashboards