adplus-dvertising

MCQ in Computer Network and Networking Part 8 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 8 | ECE Board Exam

This is the Multiple Choice Questions Part 8 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topic. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize with each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 8 of the Series

MCQ in Computer Network and Networking Part 7 | ECE Board Exam

Choose the letter of the best answer in each question.

351. Sniffers can be prevented by using _______________

A. wired environment

B. wifi

C. ethernet lan

D. switched network

View Answer:

Answer: Option D

Explanation:

352. Firewalls are often configured to block ___________

A. udp traffic

B. tcp traffic

C. sensitive traffic

D. best-effort traffic

View Answer:

Answer: Option A

Explanation:

353. UTP is commonly used in __________

A. dsl

B. fttp

C. http

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

354. Terrestrial radio channels are broadly classified into _____ groups.

A. 2

B. 3

C. 4

D. 1

View Answer:

Answer: Option B

Explanation:

355. A local telephone network is an example of a _______ network.

A. packet switched

B. circuit switched

C. bit switched

D. line switched

View Answer:

Answer: Option B

Explanation:

356. Most packet switches use this principle ____________

A. stop and wait

B. store and forward

C. store and wait

D. stop and forward

View Answer:

Answer: Option B

Explanation:

357. What are the Methods to move data through a network of links and switches?

A. packet switching and line switching

B. circuit switching and line switching

C. line switching and bit switching

D. packet switching and circuit switching

View Answer:

Answer: Option D

Explanation:

358. In _________ systems, resources are allocated on demand.

A. packet switching

B. circuit switching

C. line switching

D. frequency switching

View Answer:

Answer: Option A

Explanation:

359. Which of the following is not an application layer service?

A. network virtual terminal

B. file transfer, access, and management

C. mail service

D. error control

View Answer:

Answer: Option D

Explanation:

360. Which is not a application layer protocol?

A. http

B. smtp

C. ftp

D. tcp

View Answer:

Answer: Option D

Explanation:

361. The packet of information at the application layer is called __________

A. packet

B. message

C. segment

D. frame

View Answer:

Answer: Option B

Explanation:

362. Which one of the following is an architecture paradigm?

A. peer to peer

B. client-server

C. http

D. both peer-to-peer & client-server

View Answer:

Answer: Option D

Explanation:

363. Application layer offers _______ service.

A. end to end

B. process to process

C. both end to end and process to process

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

364. E-mail is _________

A. loss-tolerant application

B. bandwidth-sensitive application

C. elastic application

D. none of the mentioned

View Answer:

Answer: Option C

Explanation:

365. Pick the odd one out.

A. file transfer

B. file download

C. e-mail

D. interactive games

View Answer:

Answer: Option D

Explanation:

366. Which of the following is an application layer service?

A. network virtual terminal

B. file transfer, access, and management

C. mail service

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

367. Which is a time-sensitive service?

A. file transfer

B. file download

C. e-mail

D. internet telephony

View Answer:

Answer: Option D

Explanation:

368. Transport services available to applications in one or another form _________

A. reliable data transfer

B. timing

C. security

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

369. Electronic mail uses which Application layer protocol?

A. smtp

B. http

C. ftp

D. sip

View Answer:

Answer: Option A

Explanation:

370. The ____________ translates internet domain and host names to IP address.

A. domain name system

B. routing information protocol

C. network time protocol

D. internet relay chat

View Answer:

Answer: Option A

Explanation:

371. Application layer protocol defines ____________

A. types of messages exchanged

B. message format, syntax and semantics

C. rules for when and how processes send and respond to messages

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

372. When displaying a web page, the application layer uses the _____________

A. http protocol

B. ftp protocol

C. smtp protocol

D. tcp protocol

View Answer:

Answer: Option A

Explanation:

373. The default connection type used by HTTP is _________

A. persistent

B. non-persistent

C. can be either persistent or non-persistent depending on connection request

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

374. The HTTP request message is sent in _________ part of three-way handshake.

A. first

B. second

C. third

D. fourth

View Answer:

Answer: Option C

Explanation:

375. The first line of HTTP request message is called _____________

A. request line

B. header line

C. status line

D. entity line

View Answer:

Answer: Option A

Explanation:

376. The __________ method when used in the method field, leaves entity body empty.

A. post

B. send

C. get

D. put

View Answer:

Answer: Option C

Explanation:

377. Which of the following is not correct?

A. web cache doesn’t have its own disk space

B. web cache can act both like server and client

C. web cache might reduce the response time

D. web cache contains copies of recently requested objects

View Answer:

Answer: Option A

Explanation:

378. HTTP is ________ protocol.

A. application layer

B. transport layer

C. network layer

D. data link layer

View Answer:

Answer: Option A

Explanation:

379. In the network HTTP resources are located by

A. uniform resource identifier

B. unique resource locator

C. unique resource identifier

D. union resource locator

View Answer:

Answer: Option A

Explanation:

380. FTP server listens for connection on port number ____________

A. 20

B. 21

C. 22

D. 23

View Answer:

Answer: Option B

Explanation:

381. The File Transfer Protocol is built on ______________

A. data centric architecture

B. service-oriented architecture

C. client server architecture

D. connection-oriented architecture

View Answer:

Answer: Option C

Explanation:

382. In File Transfer Protocol, data transfer cannot be done in ___________

A. stream mode

B. block mode

C. compressed mode

D. message mode

View Answer:

Answer: Option D

Explanation:

383. Expansion of FTP is __________

A. fine transfer protocol

B. file transfer protocol

C. first transfer protocol

D. fast transfer protocol

View Answer:

Answer: Option B

Explanation:

384. FTP is built on _____ architecture.

A. client-server

B. p2p

C. data centric

D. service oriented

View Answer:

Answer: Option A

Explanation:

385. FTP uses _________ parallel TCP connections to transfer a file.

A. 1

B. 2

C. 3

D. 4

View Answer:

Answer: Option B

Explanation:

386. Identify the incorrect statement regarding FTP.

A. ftp stands for file transfer protocol

B. ftp uses two parallel tcp connections

C. ftp sends its control information in-band

D. ftp sends exactly one file over the data connection

View Answer:

Answer: Option C

Explanation:

387. FTP server _____________

A. maintains state information

B. is stateless

C. has single tcp connection for a file transfer

D. has udp connection for file transfer

View Answer:

Answer: Option A

Explanation:

388. Find the FTP reply whose message is wrongly matched.

A. 331 – username ok, password required

B. 425 – can’t open data connection

C. 452 – error writing file

D. 452 – can’t open data connection

View Answer:

Answer: Option D

Explanation:

389. The password is sent to the server using ________ command

A. passwd

B. pass

C. password

D. pword

View Answer:

Answer: Option B

Explanation:

390. When the mail server sends mail to other mail servers it becomes ____________

A. smtp server

B. smtp client

C. peer

D. master

View Answer:

Answer: Option B

Explanation:

391. If you have to send multimedia data over SMTP it has to be encoded into _______

A. binary

B. signal

C. ascii

D. hash

View Answer:

Answer: Option C

Explanation:

392. The underlying Transport layer protocol used by SMTP is ________

A. tcp

B. udp

C. either tcp or udp

D. imap

View Answer:

Answer: Option A

Explanation:

393. Choose the statement which is wrong in case of SMTP?

A. it requires message to be in 7bit ascii format

B. it is a pull protocol

C. it transfers files from one mail server to another mail server

D. smtp is responsible for the transmission of the mail through the internet

View Answer:

Answer: Option B

Explanation:

394. Internet mail places each object in _________

A. separate messages for each object

B. one message

C. varies with number of objects

D. multiple messages for each object

View Answer:

Answer: Option B

Explanation:

395. Typically the TCP port used by SMTP is _________

A. 25

B. 35

C. 50

D. 15

View Answer:

Answer: Option A

Explanation:

396. A session may include ________

A. zero or more smtp transactions

B. exactly one smtp transactions

C. always more than one smtp transactions

D. number of smtp transactions can’t be determined

View Answer:

Answer: Option A

Explanation:

397. Which of the following is an example of user agents for e-mail?

A. microsoft outlook

B. facebook

C. google

D. tumblr

View Answer:

Answer: Option A

Explanation:

398. User agent does not support this ___________

A. composing messages

B. reading messages

C. replying messages

D. routing messages

View Answer:

Answer: Option D

Explanation:

399. SMTP connections secured by SSL are known as _____________

A. smtps

B. ssmtp

C. snmp

D. starttls

View Answer:

Answer: Option A

Explanation:

400. SMTP uses which of the following TCP port?

A. 22

B. 23

C. 21

D. 25

View Answer:

Answer: Option D

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)