Computer Networking – Application Layer MCQs
This Portion of Computer Networking contains Computer Networking Application Layer MCQs (Multiple Choice Questions and Answers).
This Section covers below lists of topics.
1 INTRODUCTION
- Providing Services
- Application-Layer Paradigms
2 CLIENT-SERVERS PARADIGM
- Application Programming Interface
- Using Services of the Transport Layer
3 STANDARD CLIENT-SERVER APPLICATIONS
- World Wide Web and HTTP
- FTP
- Electronic Mail
- TELNET
- Secure Shell (SSH)
- Domain Name System (DNS)
4 PEERS-TO-PEER PARADIGM
- P2P Networks
- Distributed Hash Table (DHT)
- Chord
- Pastry
- Kademlia
- A Popular P2P Network: BitTorrent
5 SOCKET INTERFACE PROGRAMMING
- Socket Interface in C
1. In a client-server paradigm, a _______ program provides services to a (another) _______ program
- client; client
- client; server
- server; client
- server; server
2. In a client-server paradigm
- both the server and the client must be running all the time.
- both the server and the client need to be running only when they are needed.
- the server must be running all the time but the client needs to be running only when it is needed.
- the client must be running all the time but the server needs to be running only when it is needed
3. The first section of a URL identifier is the __________.
- protocol
- path
- host
- port
4. A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only
- static
- dynamic
- active
- None of the choices are correct
5. ._____________ is a language for creating a static document
- Extensible Style Language (XSL)
- Hypertext Markup Language (HTML)
- Extensible Markup Language (XML)
- All choices are correct
6. A _______ document is created by a Web server whenever a browser requests the document
- static
- dynamic
- active
- None of the choices are correct
7. For many applications, we need a program or a script to be run at the client site. These are called _______________ documents
- static
- dynamic
- active
- None of the choices are correct
8. HTTP uses the services of _________
- UDP
- IP
- TCP
- DNS
9. In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line
- request; response
- status; response
- status; status
- None of the choices are correct
10. In a ___________ connection, one TCP connection is made for each request/response.
- persistent
- nonpersistent
- persistent or a nonpersistent
- None of the choices are correct
11. In a ___________ connection, the server leaves the connection open for more requests after sending a response.
- persistent
- nonpersistent
- persistent or nonpersistent
- None of the choices are correct
12. In HTTP, _______ server is a computer that keeps copies of responses to recent requests.
- a regular
- a proxy
- an auxiliary
- a remote
13. An HTTP request message always contains _______.
- a header line and a body
- a request line and a header line
- a request line, a header line, and a body
- a request line, a header line, a blank line, and a body
14. Which of the following is present in both an HTTP request line and a status line?
- version number
- URL
- status code
- method
15. FTP uses the services of ________.
- UDP
- IP
- TCP
- none of the choices are correct
16. In FTP, _________ well-known port(s) is (are) used.
- one
- two
- three
- four
17. During an FTP session the control connection is opened _______.
- once
- twice
- many times
- none of the choices are correct
18. During an FTP session the data connection may be opened _______.
- only once
- only two times
- as many times as needed
- none of the choices are correct
19. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.
- file types
- data structures
- transmission modes
- none of the choices are correct
20. In FTP, there are three types of _______: stream, block, and compressed.
- file types
- data types
- transmission modes
- none of the choices are correct
21. In FTP, ASCII, EBCDIC, and image define an attribute called _______.
- file type
- data structure
- transmission mode
- none of the choices are correct
22. In FTP, when we _______, it is copied from the client to the server.
- retrieve a file
- store a file
- open a file
- none of the choices are correct
23. In the common scenario, the electronic mail system needs _________________________.
- two UAs, two MTAs and one MAA
- two UAs, two MTAs and two MAAs
- two UAs, two pairs of MTAs and a pair of MAAs
- two UAs, two pairs of MTAs and a two pairs of MAAs
24. ________ provides service to the user to make the process of sending or receiving a message easier.
- An MTA
- An MAA
- A UA
- None of the choices are correct
25. An e-mail message contains the ________ and the __________.
- header; envelop
- header; body
- envelop; body
- None of the choices are correct
26. In the Internet, an e-mail address consists of two parts: a _______ and a _______.
- local part; domain name
- global part; domain name
- label; domain name
- local part; label
27. ._________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
- SMPT
- MPEG
- MIME
- POP
28. The formal protocol that defines the MTA client and server in the Internet is called ___________.
- SMTP
- SNMP
- TELNET
- SSH
29. SMTP is a __________ protocol.
- pull
- push
- push and pull
- None of the choices are correct
30. The message access protocol is a ________ protocol.
- pull
- push
- push and pull
- None of the choices are correct
31. In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits
- 8bit
- binary
- base64
- quoted-printable
32. In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
- 8bit
- base64
- quoted-printable
- binary
33. TELNET is an abbreviation for ____________.
- terminal network
- telephone network
- telecommunication network
- None of the choices are correct
34. When a user logs into a local time-sharing system, it is called ________ login.
- local
- remote
- local or remote
- None of the choices are correct
35. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
- local
- remote
- local or remote
- None of the choices are correct
36. Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.
- sending; receiving
- request; reply
- data; control
- None of the choices are correct
37. For data, NVT uses US ASCII characters with the highest order bit set to ______.
- 1
- 0
- 1 or 0
- None of the choices are correct
38. For control, NVT uses US ASCII characters with the highest order bit set to ______.
- 1
- 0
- 1 or 0
- None of the choices are correct
39. The _______ translates local characters into NVT characters.
- terminal driver
- TELNET client
- TELNET server
- pseudoterminal driver
40. The _______ translates NVT characters into a form acceptable by the remote operating system.
- terminal driver
- TELNET client
- TELNET server
- pseudoterminal driver
41. The _________ component in the SSH provides confidentiality, integrity, authentication and compression.
- SSH Application
- SSH-AUTH
- SSH-CONN
- SSH-TRAN
42. Port forwarding is ____________________________.
- a protocol used to forward messages from one port to another port
- a procedure for changing an ephemeral port to a well-known port
- a service, provided by SSH, that creates a secure channel for applications that do not have security services.
- None of the choices are correct
43. In a _______ name space, a name is a sequence of characters without structure.
- linear
- flat
- hierarchical
- organized
44. In a _________ name space, each name is made of several parts.
- linear
- flat
- hierarchical
- organized
45. In the DNS, the names are defined in ___________ structure.
- a linear list
- an inverted-tree
- a three-dimensional
- None of the choices are correct
46. The root of the DNS tree is _______.
- a string of 127 characters
- a string of 63 characters
- a string of 15 characters
- an empty string
47. In the domain name space, a full domain name is a sequence of labels separated by ________.
- colons
- semicolons
- dots
- commas
48. In the domain name space, if a label is terminated by a null string, it is called a __________.
- PQDN
- CQDN
- SQDN
- None of the choices are correct
49. In the domain name space, if a label is not terminated by a null string, it is called a __________.
- FQDN
- PQDN
- SQDN
- None of the choices are correct
50. In the domain name space, a _________ is a subtree of the domain name space.
- label
- name
- domain
- None of the choices are correct
51. In the domain name space, what a server is responsible for or has authority over is called a _________.
- domain
- label
- zone
- None of the choices are correct
52. A _______ server is a computer whose zone system consists of the whole tree.
- domain
- zone
- root
- primary
53. A ________ server is a computer that stores a file about the zone for which it has an authority.
- primary
- secondary
- zone
- root
54. A ________ server is a computer that transfers the complete information about a zone from another server.
- primary
- secondary
- zone
- root
55. In the Internet, the country domain section uses ___________ country abbreviations.
- two-character
- three-character
- four-character
- None of the choices are correct
56. In __________ resolution, the resolver expects the server to supply the final answer.
- iterative
- recursive
- straight
- None of the choices are correct
57. In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
- iterative
- recursive
- straight
- None of the choices are correct
58. DNS can use the services of ________.
- UDP
- TCP
- either UDP or TCP
- None of the choices are correct
59. A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base
- NIC
- ICANN
- ISOC
- IEFE
60. In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm.
- client-server; client-server
- peer-to-peer; client-server
- client-server; peer-to-peer
- peer-to-peer; peer-to-peer
61. Napster is an example of a ____________ peer-to-peer network
- centralized
- structured-decentralized
- unstructured-decentralized
- None of the choices are correct
62. Gnutella is an example of a ____________ peer-to-peer network
- centralized
- structured-decentralized
- unstructured-decentralized
- None of the choices are correct
63. BitTorrent is an example of a ____________ peer-to-peer network
- centralized
- structured-decentralized
- unstructured-decentralized
- None of the choices are correct
64. In a structured-decentralized P2P network, ________________.
- the directory system is kept in a center
- a query to find a file must be flooded through the network
- a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved
- None of the choices are correct
65. In a DHT-based network, each peer
- has a partial knowledge about the whole network.
- has a complete knowledge about the whole network.
- only has a knowledge about its successor.
- None of the choices are correct
66. The finger table is the routing table used in ______________.
- Gnutella
- Pastry
- Kademlia
- None of the choices are correct
67. Which of the following is not a Chord interface.
- Lookup
- Fix node
- Stabilize
- Join
68. In __________ a key is stored in a node whose identifier is numerically closest to the key.
- Chord
- Pastry
- Kademlia
- None of the choices are correct
69. To resolve a query, _________ uses two entities: a routing table and a leaf set.
- Chord
- Pastry
- Kademlia
- None of the choices are correct
70. In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.
- AND
- NOR
- OR
- None of the choices are correct
71. In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree
- Chord
- Pastry
- Kademlia
- None of the choices are correct
72. In Kademlia, each node in the network divides the binary tree into m subtrees that.
- include the node itself
- do not include the node itself
- include the node itself and the successor node
- None of the choices are correct
73. Trackerless BitTorrent uses __________ DHT to do the job of tracking.
- Chord
- Pastry
- Kademlia
- None of the choices are correct