MCQOPTIONS
Saved Bookmarks
This section includes 254 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
FTP uses _____ parallel TCP connections to transfer a file. |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 202. |
The ______ method when used in the method field, leaves entity body empty. |
| A. | POST |
| B. | GET |
| C. | Both of the above |
| D. | None of the above |
| Answer» C. Both of the above | |
| 203. |
In FTP, client contacts server using ____ as the transport protocol. |
| A. | transmission control protocol |
| B. | user datagram protocol |
| C. | datagram congestion control protocol |
| D. | stream control transmission protocol |
| Answer» B. user datagram protocol | |
| 204. |
When the mail server sends mail to other mail servers it becomes _____ ? |
| A. | SMTP server |
| B. | SMTP client |
| C. | Peer |
| D. | None of the above |
| Answer» C. Peer | |
| 205. |
SMTP (Simple mail transfer protocol) defines |
| A. | message transport |
| B. | message encryption |
| C. | message content |
| D. | none of the above |
| Answer» B. message encryption | |
| 206. |
Choose the statement which is incorrect incase of SMTP |
| A. | It requires message to be in 7bit ASCII format |
| B. | It is a pull protocol |
| C. | It transfers files from one mail server to another mail server |
| D. | None of the above |
| Answer» C. It transfers files from one mail server to another mail server | |
| 207. |
When the sender and the receiver of an email are on different systems, we need only ______ . |
| A. | One MTA |
| B. | Two UAs |
| C. | Two UAs and one pair of MTAs |
| D. | Two UAs and two pairs of MTAs |
| Answer» E. | |
| 208. |
TELNET is an abbreviation for ____________. |
| A. | terminal network |
| B. | telephone network |
| C. | telecommunication network |
| D. | none of the above |
| Answer» B. telephone network | |
| 209. |
TELNET is a ________ client-server application program. |
| A. | specific-purpose |
| B. | general-purpose |
| C. | both a and b |
| D. | none of the above |
| Answer» C. both a and b | |
| 210. |
When a user logs into a local time-sharing system, it is called ________ login. |
| A. | local |
| B. | remote |
| C. | temporary |
| D. | none of the above |
| Answer» B. remote | |
| 211. |
NVT uses two sets of characters, one for _____and one for __________. |
| A. | sending; receiving |
| B. | request; reply |
| C. | data; control |
| D. | none of the above |
| Answer» D. none of the above | |
| 212. |
When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. |
| A. | local |
| B. | remote |
| C. | temporary |
| D. | none of the above |
| Answer» C. temporary | |
| 213. |
Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer. |
| A. | TCP |
| B. | UDP |
| C. | DCCP |
| D. | SCTP |
| Answer» B. UDP | |
| 214. |
In FTP, the password is sent to the server using _____ command. |
| A. | PASSWD |
| B. | PASS |
| C. | PASSWORD |
| D. | CODEWD |
| Answer» C. PASSWORD | |
| 215. |
The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format. |
| A. | 8 |
| B. | 7 |
| C. | 3 |
| D. | 5 |
| Answer» C. 3 | |
| 216. |
An email client needs to know the ____ of its initial SMTP server. |
| A. | IP address |
| B. | MAC address |
| C. | url |
| D. | none of the above |
| Answer» B. MAC address | |
| 217. |
A proxy server keeps copies of responses to |
| A. | Current requests |
| B. | Recent requests |
| C. | Pending requests |
| D. | Recieved Requests |
| Answer» C. Pending requests | |
| 218. |
The Uniform Resource Locator (URL), defines four things: protocol, host computer, port and |
| A. | Path |
| B. | Page |
| C. | Program |
| D. | Access |
| Answer» B. Page | |
| 219. |
The Uniform Resource Locator (URL), is a standard for specifying any kind of information on the |
| A. | Server-End |
| B. | Client-End |
| C. | WebPage |
| D. | Internet |
| Answer» E. | |
| 220. |
In Architecture, to improve efficiency, servers normally store requested files in a cache in |
| A. | Server |
| B. | Domain |
| C. | WebServer |
| D. | Memory |
| Answer» E. | |
| 221. |
The Webpages are stored at the |
| A. | Server |
| B. | Client |
| C. | Domain |
| D. | Mail Server |
| Answer» B. Client | |
| 222. |
Dynamic documents are sometimes referred to as |
| A. | Client-site dynamic documents |
| B. | Active dynamic documents |
| C. | Server-site dynamic documents |
| D. | None of the Above |
| Answer» D. None of the Above | |
| 223. |
The HTTP uses a TCP connection to |
| A. | Establishment of servers connection |
| B. | Transfer whole database |
| C. | Client server connections |
| D. | Transfer files |
| Answer» E. | |
| 224. |
The Hypertext Markup Language (HTML) is a language for creating |
| A. | Networks |
| B. | Webpages |
| C. | Protocols |
| D. | All of the Above |
| Answer» C. Protocols | |
| 225. |
An HTTP message is similar in form to an |
| A. | C+ |
| B. | SMTP |
| C. | TCP |
| D. | Perl |
| Answer» C. TCP | |
| 226. |
The Hypertext Transfer Protocol (HTTP) uses the services of TCP on |
| A. | well-known port 80 |
| B. | well-known port 81 |
| C. | well-known port 82 |
| D. | well-known port 83 |
| Answer» B. well-known port 81 | |
| 227. |
The proxy server reduces the load on the |
| A. | Proxy Server |
| B. | Node Server |
| C. | Domain Server |
| D. | Original Server |
| Answer» E. | |
| 228. |
Application layer offers _______ service |
| A. | End to end |
| B. | Process to process |
| C. | Both of the mentioned |
| D. | None of the mentioned |
| Answer» B. Process to process | |
| 229. |
_______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. |
| A. | TELNET |
| B. | SMTP |
| C. | TFTP |
| D. | none of the above |
| Answer» E. | |
| 230. |
When a client sends a request to a server, the browser looks for it in the |
| A. | Addresses |
| B. | Cookie Directory |
| C. | Active Directory |
| D. | Host Directory |
| Answer» C. Active Directory | |
| 231. |
In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection. |
| A. | 21; 22 |
| B. | 21; 20 |
| C. | 20; 21 |
| D. | none of the above |
| Answer» C. 20; 21 | |
| 232. |
The Application layer in OSI is implemented in |
| A. | NIC |
| B. | Ethernet |
| C. | End System |
| D. | None |
| Answer» D. None | |
| 233. |
A Web page is made up of two parts |
| A. | Header and Footer |
| B. | Text and Number |
| C. | Document and Body |
| D. | Head and Body |
| Answer» E. | |
| 234. |
FTP uses the services of ________. |
| A. | UDP |
| B. | IP |
| C. | TCP |
| D. | none of the above |
| Answer» D. none of the above | |
| 235. |
In FTP, ASCII, EBCDIC, and image define an attribute called _______. |
| A. | file type |
| B. | data structure |
| C. | transmission mode |
| D. | none of the above |
| Answer» B. data structure | |
| 236. |
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. |
| A. | file types |
| B. | data structures |
| C. | transmission modes |
| D. | none of the above |
| Answer» C. transmission modes | |
| 237. |
During an FTP session the control connection is opened _______. |
| A. | exactly once |
| B. | exactly twice |
| C. | as many times as necessary |
| D. | none of the above |
| Answer» B. exactly twice | |
| 238. |
For the control connection, FTP uses the __________ character set. |
| A. | regular ASCII |
| B. | EBCDIC |
| C. | NVT ASCII |
| D. | none of the above |
| Answer» D. none of the above | |
| 239. |
When the sender and the receiver of an email are on different systems, we need only _____________. |
| A. | one MTA |
| B. | two UAs |
| C. | two UAs and one pair of MTAs |
| D. | none of the above |
| Answer» D. none of the above | |
| 240. |
In FTP, when we _______, it is copied from the client to the server. |
| A. | retrieve a file |
| B. | store a file |
| C. | retrieve a list |
| D. | none of the above |
| Answer» C. retrieve a list | |
| 241. |
The Application layer in TCP/IP contains the ___________ protocols. |
| A. | Routing |
| B. | Routed |
| C. | Communication |
| D. | Process-to-process |
| Answer» D. Process-to-process | |
| 242. |
Which of the following is the Application layer protocol in Internet Protocol Suite? |
| A. | SSH |
| B. | XMPP |
| C. | IMAP |
| D. | All of the above |
| Answer» E. | |
| 243. |
Which of the following is the Application layer protocol in OSI model? 1.DHCP 2.FTP 3.RSVP 4.NNTP |
| A. | Only 1 |
| B. | Only 2 |
| C. | Only 3 |
| D. | 1, 2 and 4 |
| Answer» E. | |
| 244. |
Which of the following protocol is used to send email? |
| A. | SMTP |
| B. | POP3 |
| C. | POP |
| D. | SNMP |
| Answer» B. POP3 | |
| 245. |
Which of the following protocol is used to retrieve emails? |
| A. | SMTP |
| B. | POP3 |
| C. | FTP |
| D. | SNMP |
| Answer» C. FTP | |
| 246. |
Which of the following is/are example(s) of stateful application layer protocols?(i) HTTP(ii) FTP(iii) TCP(iv) POP3 |
| A. | (i) and (ii) only |
| B. | (ii) and (iii) only |
| C. | (ii) and (iv) only |
| D. | (iv) only |
| Answer» D. (iv) only | |
| 247. |
What does HTTPS stands for? |
| A. | Hyper Text Transmission Protocols |
| B. | Hyper Text Tile Protocols |
| C. | Hyper Text Transfer Protocol Secure |
| D. | None |
| Answer» D. None | |
| 248. |
Identify the correct order in which the following actions take place in an interaction between a web browser and a web server.1. The web browser requests a webpage using HTTP.2. The web browser establishes a TCP connection with the web server.3. The web server sends the requested webpage using HTTP.4. The web browser resolves the domain name using DNS. |
| A. | 4,2,1,3 |
| B. | 1,2,3,4 |
| C. | 4,1,2,3 |
| D. | 2,4,1,3 |
| Answer» B. 1,2,3,4 | |
| 249. |
Application is the ____layer in OSI model |
| A. | 7th |
| B. | 6th |
| C. | 5th |
| D. | 4th |
| Answer» B. 6th | |
| 250. |
Mail services are available to network users through the _______ layer. |
| A. | Data link |
| B. | Physical |
| C. | Transport |
| D. | Application |
| Answer» E. | |