This Portion of Computer Networking contains Computer Networking Application Layer MCQs (Multiple Choice Questions and Answers).

This Section covers below lists of topics.

1 INTRODUCTION

  • Providing Services
  • Application-Layer Paradigms

2 CLIENT-SERVERS PARADIGM

  • Application Programming Interface
  • Using Services of the Transport Layer

3 STANDARD CLIENT-SERVER APPLICATIONS

  • World Wide Web and HTTP
  • FTP
  • Electronic Mail
  • TELNET
  • Secure Shell (SSH)
  • Domain Name System (DNS)

4 PEERS-TO-PEER PARADIGM

  • P2P Networks
  • Distributed Hash Table (DHT)
  • Chord
  • Pastry
  • Kademlia
  • A Popular P2P Network: BitTorrent

5 SOCKET INTERFACE PROGRAMMING

  • Socket Interface in C

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. In a client-server paradigm, a _______ program provides services to a (another) _______ program

  • client; client
  • client; server
  • server; client
  • server; server

2. In a client-server paradigm

  • both the server and the client must be running all the time.
  • both the server and the client need to be running only when they are needed.
  • the server must be running all the time but the client needs to be running only when it is needed.
  • the client must be running all the time but the server needs to be running only when it is needed

3. The first section of a URL identifier is the __________.

  • protocol
  • path
  • host
  • port

4. A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only

  • static
  • dynamic
  • active
  • None of the choices are correct

5. ._____________ is a language for creating a static document

  • Extensible Style Language (XSL)
  • Hypertext Markup Language (HTML)
  • Extensible Markup Language (XML)
  • All choices are correct

6. A _______ document is created by a Web server whenever a browser requests the document

  • static
  • dynamic
  • active
  • None of the choices are correct

7. For many applications, we need a program or a script to be run at the client site. These are called _______________ documents

  • static
  • dynamic
  • active
  • None of the choices are correct

8. HTTP uses the services of _________

  • UDP
  • IP
  • TCP
  • DNS

9. In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line

  • request; response
  • status; response
  • status; status
  • None of the choices are correct

10. In a ___________ connection, one TCP connection is made for each request/response.

  • persistent
  • nonpersistent
  • persistent or a nonpersistent
  • None of the choices are correct

11. In a ___________ connection, the server leaves the connection open for more requests after sending a response.

  • persistent
  • nonpersistent
  • persistent or nonpersistent
  • None of the choices are correct

12. In HTTP, _______ server is a computer that keeps copies of responses to recent requests.

  • a regular
  • a proxy
  • an auxiliary
  • a remote

13. An HTTP request message always contains _______.

  • a header line and a body
  • a request line and a header line
  • a request line, a header line, and a body
  • a request line, a header line, a blank line, and a body

14. Which of the following is present in both an HTTP request line and a status line?

  • version number
  • URL
  • status code
  • method

15. FTP uses the services of ________.

  • UDP
  • IP
  • TCP
  • none of the choices are correct

16. In FTP, _________ well-known port(s) is (are) used.

  • one
  • two
  • three
  • four

17. During an FTP session the control connection is opened _______.

  • once
  • twice
  • many times
  • none of the choices are correct

18. During an FTP session the data connection may be opened _______.

  • only once
  • only two times
  • as many times as needed
  • none of the choices are correct

19. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.

  • file types
  • data structures
  • transmission modes
  • none of the choices are correct

20. In FTP, there are three types of _______: stream, block, and compressed.

  • file types
  • data types
  • transmission modes
  • none of the choices are correct

21. In FTP, ASCII, EBCDIC, and image define an attribute called _______.

  • file type
  • data structure
  • transmission mode
  • none of the choices are correct

22. In FTP, when we _______, it is copied from the client to the server.

  • retrieve a file
  • store a file
  • open a file
  • none of the choices are correct

23. In the common scenario, the electronic mail system needs _________________________.

  • two UAs, two MTAs and one MAA
  • two UAs, two MTAs and two MAAs
  • two UAs, two pairs of MTAs and a pair of MAAs
  • two UAs, two pairs of MTAs and a two pairs of MAAs

24. ________ provides service to the user to make the process of sending or receiving a message easier.

  • An MTA
  • An MAA
  • A UA
  • None of the choices are correct

25. An e-mail message contains the ________ and the __________.

  • header; envelop
  • header; body
  • envelop; body
  • None of the choices are correct

26. In the Internet, an e-mail address consists of two parts: a _______ and a _______.

  • local part; domain name
  • global part; domain name
  • label; domain name
  • local part; label

27. ._________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.

  • SMPT
  • MPEG
  • MIME
  • POP

28. The formal protocol that defines the MTA client and server in the Internet is called ___________.

  • SMTP
  • SNMP
  • TELNET
  • SSH

29. SMTP is a __________ protocol.

  • pull
  • push
  • push and pull
  • None of the choices are correct

30. The message access protocol is a ________ protocol.

  • pull
  • push
  • push and pull
  • None of the choices are correct

31. In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits

  • 8bit
  • binary
  • base64
  • quoted-printable

32. In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.

  • 8bit
  • base64
  • quoted-printable
  • binary

33. TELNET is an abbreviation for ____________.

  • terminal network
  • telephone network
  • telecommunication network
  • None of the choices are correct

34. When a user logs into a local time-sharing system, it is called ________ login.

  • local
  • remote
  • local or remote
  • None of the choices are correct

35. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.

  • local
  • remote
  • local or remote
  • None of the choices are correct

36. Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.

  • sending; receiving
  • request; reply
  • data; control
  • None of the choices are correct

37. For data, NVT uses US ASCII characters with the highest order bit set to ______.

  • 1
  • 0
  • 1 or 0
  • None of the choices are correct

38. For control, NVT uses US ASCII characters with the highest order bit set to ______.

  • 1
  • 0
  • 1 or 0
  • None of the choices are correct

39. The _______ translates local characters into NVT characters.

  • terminal driver
  • TELNET client
  • TELNET server
  • pseudoterminal driver

40. The _______ translates NVT characters into a form acceptable by the remote operating system.

  • terminal driver
  • TELNET client
  • TELNET server
  • pseudoterminal driver

41. The _________ component in the SSH provides confidentiality, integrity, authentication and compression.

  • SSH Application
  • SSH-AUTH
  • SSH-CONN
  • SSH-TRAN

42. Port forwarding is ____________________________.

  • a protocol used to forward messages from one port to another port
  • a procedure for changing an ephemeral port to a well-known port
  • a service, provided by SSH, that creates a secure channel for applications that do not have security services.
  • None of the choices are correct

43. In a _______ name space, a name is a sequence of characters without structure.

  • linear
  • flat
  • hierarchical
  • organized

44. In a _________ name space, each name is made of several parts.

  • linear
  • flat
  • hierarchical
  • organized

45. In the DNS, the names are defined in ___________ structure.

  • a linear list
  • an inverted-tree
  • a three-dimensional
  • None of the choices are correct

46. The root of the DNS tree is _______.

  • a string of 127 characters
  • a string of 63 characters
  • a string of 15 characters
  • an empty string

47. In the domain name space, a full domain name is a sequence of labels separated by ________.

  • colons
  • semicolons
  • dots
  • commas

48. In the domain name space, if a label is terminated by a null string, it is called a __________.

  • PQDN
  • CQDN
  • SQDN
  • None of the choices are correct

49. In the domain name space, if a label is not terminated by a null string, it is called a __________.

  • FQDN
  • PQDN
  • SQDN
  • None of the choices are correct

50. In the domain name space, a _________ is a subtree of the domain name space.

  • label
  • name
  • domain
  • None of the choices are correct

51. In the domain name space, what a server is responsible for or has authority over is called a _________.

  • domain
  • label
  • zone
  • None of the choices are correct

52. A _______ server is a computer whose zone system consists of the whole tree.

  • domain
  • zone
  • root
  • primary

53. A ________ server is a computer that stores a file about the zone for which it has an authority.

  • primary
  • secondary
  • zone
  • root

54. A ________ server is a computer that transfers the complete information about a zone from another server.

  • primary
  • secondary
  • zone
  • root

55. In the Internet, the country domain section uses ___________ country abbreviations.

  • two-character
  • three-character
  • four-character
  • None of the choices are correct

56. In __________ resolution, the resolver expects the server to supply the final answer.

  • iterative
  • recursive
  • straight
  • None of the choices are correct

57. In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.

  • iterative
  • recursive
  • straight
  • None of the choices are correct

58. DNS can use the services of ________.

  • UDP
  • TCP
  • either UDP or TCP
  • None of the choices are correct

59. A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base

  • NIC
  • ICANN
  • ISOC
  • IEFE

60. In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm.

  • client-server; client-server
  • peer-to-peer; client-server
  • client-server; peer-to-peer
  • peer-to-peer; peer-to-peer

61. Napster is an example of a ____________ peer-to-peer network

  • centralized
  • structured-decentralized
  • unstructured-decentralized
  • None of the choices are correct

62. Gnutella is an example of a ____________ peer-to-peer network

  • centralized
  • structured-decentralized
  • unstructured-decentralized
  • None of the choices are correct

63. BitTorrent is an example of a ____________ peer-to-peer network

  • centralized
  • structured-decentralized
  • unstructured-decentralized
  • None of the choices are correct

64. In a structured-decentralized P2P network, ________________.

  • the directory system is kept in a center
  • a query to find a file must be flooded through the network
  • a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved
  • None of the choices are correct

65. In a DHT-based network, each peer

  • has a partial knowledge about the whole network.
  • has a complete knowledge about the whole network.
  • only has a knowledge about its successor.
  • None of the choices are correct

66. The finger table is the routing table used in ______________.

  • Gnutella
  • Pastry
  • Kademlia
  • None of the choices are correct

67. Which of the following is not a Chord interface.

  • Lookup
  • Fix node
  • Stabilize
  • Join

68. In __________ a key is stored in a node whose identifier is numerically closest to the key.

  • Chord
  • Pastry
  • Kademlia
  • None of the choices are correct

69. To resolve a query, _________ uses two entities: a routing table and a leaf set.

  • Chord
  • Pastry
  • Kademlia
  • None of the choices are correct

70. In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.

  • AND
  • NOR
  • OR
  • None of the choices are correct

71. In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree

  • Chord
  • Pastry
  • Kademlia
  • None of the choices are correct

72. In Kademlia, each node in the network divides the binary tree into m subtrees that.

  • include the node itself
  • do not include the node itself
  • include the node itself and the successor node
  • None of the choices are correct

73. Trackerless BitTorrent uses __________ DHT to do the job of tracking.

  • Chord
  • Pastry
  • Kademlia
  • None of the choices are correct
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook