
This is the Multiple Choice Questions Part 8 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topic. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize with each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.
Continue Practice Exam Test Questions Part 8 of the Series
⇐ MCQ in Computer Network and Networking Part 7 | ECE Board Exam
Choose the letter of the best answer in each question.
351. Sniffers can be prevented by using _______________
A. wired environment
B. wifi
C. ethernet lan
D. switched network
Answer: Option D
Explanation:
352. Firewalls are often configured to block ___________
A. udp traffic
B. tcp traffic
C. sensitive traffic
D. best-effort traffic
Answer: Option A
Explanation:
353. UTP is commonly used in __________
A. dsl
B. fttp
C. http
D. none of the mentioned
Answer: Option A
Explanation:
354. Terrestrial radio channels are broadly classified into _____ groups.
A. 2
B. 3
C. 4
D. 1
Answer: Option B
Explanation:
355. A local telephone network is an example of a _______ network.
A. packet switched
B. circuit switched
C. bit switched
D. line switched
Answer: Option B
Explanation:
356. Most packet switches use this principle ____________
A. stop and wait
B. store and forward
C. store and wait
D. stop and forward
Answer: Option B
Explanation:
357. What are the Methods to move data through a network of links and switches?
A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer: Option D
Explanation:
358. In _________ systems, resources are allocated on demand.
A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer: Option A
Explanation:
359. Which of the following is not an application layer service?
A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. error control
Answer: Option D
Explanation:
360. Which is not a application layer protocol?
A. http
B. smtp
C. ftp
D. tcp
Answer: Option D
Explanation:
361. The packet of information at the application layer is called __________
A. packet
B. message
C. segment
D. frame
Answer: Option B
Explanation:
362. Which one of the following is an architecture paradigm?
A. peer to peer
B. client-server
C. http
D. both peer-to-peer & client-server
Answer: Option D
Explanation:
363. Application layer offers _______ service.
A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Answer: Option A
Explanation:
364. E-mail is _________
A. loss-tolerant application
B. bandwidth-sensitive application
C. elastic application
D. none of the mentioned
Answer: Option C
Explanation:
365. Pick the odd one out.
A. file transfer
B. file download
C. e-mail
D. interactive games
Answer: Option D
Explanation:
366. Which of the following is an application layer service?
A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. all of the mentioned
Answer: Option D
Explanation:
367. Which is a time-sensitive service?
A. file transfer
B. file download
C. e-mail
D. internet telephony
Answer: Option D
Explanation:
368. Transport services available to applications in one or another form _________
A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer: Option D
Explanation:
369. Electronic mail uses which Application layer protocol?
A. smtp
B. http
C. ftp
D. sip
Answer: Option A
Explanation:
370. The ____________ translates internet domain and host names to IP address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer: Option A
Explanation:
371. Application layer protocol defines ____________
A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer: Option D
Explanation:
372. When displaying a web page, the application layer uses the _____________
A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Answer: Option A
Explanation:
373. The default connection type used by HTTP is _________
A. persistent
B. non-persistent
C. can be either persistent or non-persistent depending on connection request
D. none of the mentioned
Answer: Option A
Explanation:
374. The HTTP request message is sent in _________ part of three-way handshake.
A. first
B. second
C. third
D. fourth
Answer: Option C
Explanation:
375. The first line of HTTP request message is called _____________
A. request line
B. header line
C. status line
D. entity line
Answer: Option A
Explanation:
376. The __________ method when used in the method field, leaves entity body empty.
A. post
B. send
C. get
D. put
Answer: Option C
Explanation:
377. Which of the following is not correct?
A. web cache doesn’t have its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Answer: Option A
Explanation:
378. HTTP is ________ protocol.
A. application layer
B. transport layer
C. network layer
D. data link layer
Answer: Option A
Explanation:
379. In the network HTTP resources are located by
A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer: Option A
Explanation:
380. FTP server listens for connection on port number ____________
A. 20
B. 21
C. 22
D. 23
Answer: Option B
Explanation:
381. The File Transfer Protocol is built on ______________
A. data centric architecture
B. service-oriented architecture
C. client server architecture
D. connection-oriented architecture
Answer: Option C
Explanation:
382. In File Transfer Protocol, data transfer cannot be done in ___________
A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer: Option D
Explanation:
383. Expansion of FTP is __________
A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
D. fast transfer protocol
Answer: Option B
Explanation:
384. FTP is built on _____ architecture.
A. client-server
B. p2p
C. data centric
D. service oriented
Answer: Option A
Explanation:
385. FTP uses _________ parallel TCP connections to transfer a file.
A. 1
B. 2
C. 3
D. 4
Answer: Option B
Explanation:
386. Identify the incorrect statement regarding FTP.
A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer: Option C
Explanation:
387. FTP server _____________
A. maintains state information
B. is stateless
C. has single tcp connection for a file transfer
D. has udp connection for file transfer
Answer: Option A
Explanation:
388. Find the FTP reply whose message is wrongly matched.
A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer: Option D
Explanation:
389. The password is sent to the server using ________ command
A. passwd
B. pass
C. password
D. pword
Answer: Option B
Explanation:
390. When the mail server sends mail to other mail servers it becomes ____________
A. smtp server
B. smtp client
C. peer
D. master
Answer: Option B
Explanation:
391. If you have to send multimedia data over SMTP it has to be encoded into _______
A. binary
B. signal
C. ascii
D. hash
Answer: Option C
Explanation:
392. The underlying Transport layer protocol used by SMTP is ________
A. tcp
B. udp
C. either tcp or udp
D. imap
Answer: Option A
Explanation:
393. Choose the statement which is wrong in case of SMTP?
A. it requires message to be in 7bit ascii format
B. it is a pull protocol
C. it transfers files from one mail server to another mail server
D. smtp is responsible for the transmission of the mail through the internet
Answer: Option B
Explanation:
394. Internet mail places each object in _________
A. separate messages for each object
B. one message
C. varies with number of objects
D. multiple messages for each object
Answer: Option B
Explanation:
395. Typically the TCP port used by SMTP is _________
A. 25
B. 35
C. 50
D. 15
Answer: Option A
Explanation:
396. A session may include ________
A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions can’t be determined
Answer: Option A
Explanation:
397. Which of the following is an example of user agents for e-mail?
A. microsoft outlook
B. facebook
C. google
D. tumblr
Answer: Option A
Explanation:
398. User agent does not support this ___________
A. composing messages
B. reading messages
C. replying messages
D. routing messages
Answer: Option D
Explanation:
399. SMTP connections secured by SSL are known as _____________
A. smtps
B. ssmtp
C. snmp
D. starttls
Answer: Option A
Explanation:
400. SMTP uses which of the following TCP port?
A. 22
B. 23
C. 21
D. 25
Answer: Option D
Explanation:
- MCQ in Computer Network and Networking Part 20 | ECE Board Exam
- MCQ in Computer Network and Networking Part 19 | ECE Board Exam
- MCQ in Computer Network and Networking Part 18 | ECE Board Exam
- MCQ in Computer Network and Networking Part 17 | ECE Board Exam
- MCQ in Computer Network and Networking Part 16 | ECE Board Exam
- MCQ in Computer Network and Networking Part 15 | ECE Board Exam
- MCQ in Computer Network and Networking Part 14 | ECE Board Exam
- MCQ in Computer Network and Networking Part 13 | ECE Board Exam
- MCQ in Computer Network and Networking Part 12 | ECE Board Exam
- MCQ in Computer Network and Networking Part 11 | ECE Board Exam
- MCQ in Computer Network and Networking Part 10 | ECE Board Exam
- MCQ in Computer Network and Networking Part 9 | ECE Board Exam
- MCQ in Computer Network and Networking Part 8 | ECE Board Exam
- MCQ in Computer Network and Networking Part 7 | ECE Board Exam
- MCQ in Computer Network and Networking Part 6 | ECE Board Exam
- MCQ in Computer Network and Networking Part 5 | ECE Board Exam
- MCQ in Computer Network and Networking Part 4 | ECE Board Exam
- MCQ in Computer Network and Networking Part 3 | ECE Board Exam
- MCQ in Computer Network and Networking Part 2 | ECE Board Exam
- MCQ in Computer Network and Networking Part 1 | ECE Board Exam
MCQ in Computer Fundamentals Series
Complete List of MCQ in Communications Engineering per topic
Complete List of MCQ in Electronics Engineering per topic
P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.
“Will you subscribe today via YOUTUBE?”
TIRED OF ADS?
- Become Premium Member and experienced fewer ads to ads-free browsing.
- Full Content Access Exclusive to Premium members
- Access to PINOYBIX FREEBIES folder
- Download Reviewers and Learning Materials Free
- Download Content: You can see download/print button at the bottom of each post.
PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:
- CIVIL ENGINEERING REVIEWER
- CIVIL SERVICE EXAM REVIEWER
- CRIMINOLOGY REVIEWER
- ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
- ELECTRICAL ENGINEERING & RME REVIEWER
- FIRE OFFICER EXAMINATION REVIEWER
- LET REVIEWER
- MASTER PLUMBER REVIEWER
- MECHANICAL ENGINEERING REVIEWER
- NAPOLCOM REVIEWER
- Additional upload reviewers and learning materials are also FREE
FOR A LIMITED TIME
If you subscribe for PREMIUM today!
You will receive an additional 1 month of Premium Membership FREE.
For Bronze Membership an additional 2 months of Premium Membership FREE.
For Silver Membership an additional 3 months of Premium Membership FREE.
For Gold Membership an additional 5 months of Premium Membership FREE.
Join the PinoyBIX community.