Sunday 18 March 2012

Data Communication And Networks 03


  1. ISO stands for
    1. International Organization for Standardization
    2. Internet Organization for Standardization
    3. International Organization Standardization
    4. International for Organization  Standardization
  2. The main principle of layered architecture is
    1. Separation of responsibility
    2. Addition of responsibility
    3. Subtraction of responsibility
    4. None of these
  3. Which type of network operating system in Novell Netware

    1. Client
    2. Server
    3. Both a & b
    4. None of these

  1. How many layers a Novell Netware protocol stack uses

    1. 3
    2. 4
    3. 5
    4. 6

  1. TCP/IP model  is the _______ , which is used in the OSI model

    1. Oldest protocol
    2. Not so old protocol
    3. Newly established protocol
    4. None of these

  1. In layered architecture, each layer is responsible for a ________ amount of work

    1. Infinite
    2. Finite
    3. Large
    4. None of these

  1. Layering the communications process means breaking down the communication process into______ and _____ to handle interdependent categories

    1. Smaller
    2. Easier
    3. Both a & b
    4. None of these

  1.  The convention and rules used in such communications are collectively known as

    1. Peer
    2. Layer protocol
    3. Network
    4. None of these

  1.  The entities comprising the corresponding layers on different computers are called ________ which communicate by using layer protocol

    1. Peer
    2. Layer protocol
    3. Network
    4. None of these

    1.  
  1. OSI has two meanings refers to
    1. OSI basic reference model
    2. Protocol that are authorized by ISO
    3. Both a & b
    4. None of these
  2.  Network is the term used for a group of

    1. protocols
    2. layers
    3. Both a & b
    4. None of these


  1. The groups of layers provides information to allows _________, which correctly obeys the appropriate protocol

    1. Hardware implementation
    2. Software implementation
    3. Both a & b
    4. None of these

  1. Which are never form a part of the architecture because they are not visible from the outside

    1. Interface specification
    2. Implementation details
    3. Both a & b
    4. None of these

    1.  
  1. The information exchanged between two computers is physically carried by means of _________ with the help of certain coding method

    1. Electronics signal
    2. Electrical signal
    3. Physical signal
    4. Physical circuits

  1.  For two computers to reliably exchange data, they must have a
    1. compatible implementation of encoding
    2. interpreting data carrying electrical signals
    3. Both a & b
    4. None of these
  2. Transmission media deals with the types of medium used , which is dictated by the

    1. Desirable bandwidth
    2. Immunity to noise
    3. Attenuation properties
    4. All of these

    1.  
  1. The data communication process allocates memory resources, commonly known as___________ for the sake of transmission and reception of data

    1. Communication buffers
    2. Communication media
    3. Both a & b
    4. None of these

18.  The receiving computer must be capable of distinguishing between information
Carrying signal and mere noise

    1. Error control
    2. Logical channels
    3. Routing
    4. All of these

  1. In error control, this corruption could be in the form of ________________

    1. Noise
    2. Electromagnetic interference
    3. Both a & b
    4. None of these

  1. Protocols should provide at least ______ logical channels per connection

    1. 2
    2. 3
    3. 4
    4. 5

  1.  Data exchange can take place between any _____ workstations

    1. 1
    2. 2
    3. 3
    4. 4

  1. Depending on the nature of the involved application in layered architecture, the dialog type may be

    1. Duplex
    2. Half duplex
    3. Simplex mode
    4. All of these

  1.  The session recovery can be achieved by providing a

    1. Checkpoint
    2. Check mechanism
    3. Character encoding
    4. Terminal emulation

  1. The check pointing circumvent session recovery requirement by retransmitting only the

    1. Affected files
    2. Saving time
    3. Bandwidth
    4. All of these

    1.  
  1. Some good examples of presentation problems are the existing incompatibilities  between the__________ standard of character encoding

    1. ASCII
    2. EBCDIC
    3. Both a & b
    4. None of these

    1.  
  1.   This is the entities in the same layers but on different computers

    1. Peer entities
    2. Entities
    3. Service provider
    4. SAP

  1.  Which function of the layer provides certain services

    1. Peer entities
    2. Entities
    3. Service provider
    4. SAP

  1. Which function of the layer uses certain services

    1. Peer entities
    2. Entities
    3. Service provider
    4. Service user

  1. Which is the point from where services can be accessed .each point is the unique address

    1. Peer entities
    2. Entities
    3. Service provider
    4. SAP

30.  Which are the active elements such as processes, IO chips in every layers

    1. Peer entities
    2. Entities
    3. Service provider
    4. SAP

  1. Which is the reliable connectionless service with acknowledgement

    1. Registered E-mail
    2. Junk E-mail
    3. Both a & b
    4. None of these

  1.   Which is the unreliable connectionless service without acknowledgement

    1. Registered E-mail
    2. Junk E-mail
    3. Both a & b
    4. None of these

    1.  
  1. In which model, Request-reply command is example of connectionless service

    1. Client-server model
    2. User model
    3. Server model
    4. None of these

  1.             Which service is specified by a set of primitives available to a service user to interact with the service provider

    1. connection-oriented
    2. connectionless
    3. Both a & b
    4. None of these

  1. Which are parameters to define conditions

    1. Protocol
    2. Primitives
    3. Confirmed service
    4. SAP

  1. A confirmed services is defined with a

    1. Request
    2. Confirm
    3. Response
    4. Indication
    5. Primitives
    6. All of these

    1.  
  1. The Service primitives are the part of

    1. Protocol
    2. Primitives
    3. Confirmed service
    4. SAP

  1. An unconfirmed is defined with a

    1. Request
    2. Indication
    3. Confirm
    4. Response
    5. Both a & b
    6. All of these

  1. Which are the distinct concepts and are important to release connections between sender and receiver

    1. Services
    2. Protocol
    3. Both a & b
    4. None of these

    1.  
  1. Which is provided to the upper layer by an immediate lower layer

    1. Protocol to service
    2. Service to protocol
    3. Service primitives
    4. None of these

  1.  The characteristic of each layer are as

    1. Name
    2. Content
    3. Function
    4. Total no of layers depend on type of network
    5. All of these

    1.  
  1. The basic function of each single layer is to provides service to the

    1. Layer of the top
    2. Layer of the bottom
    3. Layer above it
    4. Layer below it

  1. ________ the protocol can make communication between the two either difficult or impossible

    1. Breaching
    2. Branching
    3. Broaching
    4. Brunching

  1. The network architecture can be termed as a

    1. Set of layers
    2. Set of protocols
    3. Set of machines
    4. Both a & b

  1. The hectic task of designing the whole network can be distributed in the

    1. Smaller
    2. Easier
    3. Simpler design problems
    4. All of these

  1. Which is the computers from the same manufacturer it was not possible to run both_______ solution and _______ simultaneously

    1. IBM
    2. DEC
    3. Both a & b
    4. None of these

  1. ISO-OSI reference model these could only be run one at a time by the end__________

    1. 1969s
    2. 1971s
    3. 1970s
    4. 1972s

  1. Which is a reliable connection-oriented service has two subparts

    1. Message sequences
    2. Byte streams
    3. Both a & b
    4. None of these

    1.  
  1. Which is similar to postal system where every message contains the complete destination address and is mapped through the system, free of all the others

    1. Connection-oriented services
    2. Connectionless services
    3. Both a & b
    4. None of these

  1. The various types of services provided by the interface to the layers above them are listed as follows

    1. Connection-oriented services
    2. Connectionless services
    3. Both a & b
    4. None of these

  1. The connectionless services can be further sub-divided into many categories

    1. Unreliable datagram
    2. Acknowledged datagram
    3. Both a & b
    4. None of these

  1. Unreliable connectionless service can be also termed as

    1. Datagram service
    2. Data service
    3. Byte stream service
    4.  None of these

  1. By the end of _________, the Open System Interconnection model was developed by the International Organization for Standardization to break the barrier

    1. 1980
    2. 1970
    3. 1990
    4. 1960

  1. The first and the lowest layer is called the ___________________________
    1. Physical layer
    2. Supporting rules for low-level signaling
    3. Hardware implementation
    4. All of these
  2. The seventh and the highest layer is the application layer that deals with the

    1. User interface
    2. Applications
    3. Both a & b
    4. None of these

  1. In moving from layer one to layer seven, the level of abstraction ________

    1. Increases
    2. Decreases
    3. May be increases or decreases
    4. None of these

    1.  
  1. The first layer deals with the actual ____________
    1. Hardware of  networks
    2. The specific methods of sending bits from one device to another
    3. Both a & b
    4. None of these
  2. The second layer also deals with ________________

    1. Signaling
    2. Hardware
    3. Both a & b
    4. None of these

    1.  
  1. The transport layer is the one, which links the communication process to this _________________

    1. Hardware-oriented protocol
    2. Software-oriented protocol
    3. Both a & b
    4. None of these

  1. Which is collectively known as a protocol data unit(PDU)

    1. Data
    2. Header
    3. Both a & b
    4. None of these

  1. The seventh layer does not deal with __________ concepts very much

    1. Hardware
    2. Even operating system
    3. Both a & b
    4. None of these

  1. The basic philosophy of the seven-layer model is that each layer may be defined
    1. Dependently of every other layer
    2. Independently of every other layer
    3. Dependent on same layer
    4. None of these
  2. The seven layers of the OSI model are categorized into ________ groupings

    1. 2
    2. 3
    3. 4
    4. 5

  1. The lower layers are layers

    1. 1,2,3
    2. 1,2,3,4
    3. 1,2,3,4,5
    4. 2,3,4,5,6

  1. The upper layers are layers

    1. 5,6
    2. 5,7
    3. 6,7
    4. 5,6,7

  1. The lower layers are implemented by using ______________ with the incidence of hardware ‘reducing’ to software from layer 1 to layer 4

    1. Software
    2. Hardware
    3. Both a & b
    4. None of these

    1.  
  1. The upper layers are not expected to know anything about ____________

    1. Networking
    2. Network addresses
    3. Both a & b
    4. None of these

  1. The bottom four layers take the responsibility of _________________

    1. Networking
    2. Network addresses
    3. Both a & b
    4. None of these

    1.  
  1. The OSI interface is a process of communication between adjacent layers in which data is passed between

    1. Layer n
    2. Layer n-1
    3. Layer n+1
    4. All of these

  1. The layers 3 and 4 interface are used by protocol to _____________

    1. Pass control
    2. Pass Data information
    3. Both a & b
    4. None of these

  1. This refers to communication up and down the protocol stack every time any data is sent received across the network

    1. Vertical communication
    2. Horizontal communication
    3. Protocols
    4. OSI interfaces

  1. Which is a communication process running at a particular layer on one host machine can accomplish logical communication with a similar process running at the same layer on another host machine
    1. Vertical communication
    2. Horizontal communication
    3. Protocols
    4. OSI interfaces
  2. Which OSI model supports the interconnection of different implementations of various autonomous layers

    1. Modularity
    2. Inter-layer interactions
    3. Both a & b
    4. None of these

    1.  











  1. The functions of the OSI layer model are

Layers
Functions
1
Physical
It moves bits between devices by using media
2
Data link
It tends to assemble packets into bytes and bytes into frames and provides access to media by using MAC address
3

Network
It is responsible for providing logical addressing which routers use for path determination and routing
4
Transport
It provides reliable or unreliable delivery and performs error correction before retransmit. It is also responsible for end-to-end connection
5
Session
It aims to keep different applications data separately and provides dialog control
6
Presentation
It provides rules to present data, handle processing like encryption, compression and translation services
7
Application
It aims to provide a user interface like file, print, message, database and application services
  1. A number of transmission media exist, some of them are

    1. Open wire circuits
    2. Twisted pair cables
    3. Coaxial cables
    4. Fiber optic cables
    5. Wireless
    6. All of these

  1. The physical layer specifies the representation of each bit as a

    1. Voltage
    2. Current
    3. Phase or frequency
    4. All of these

  1. The physical layer uses four types of bit signaling approaches these are
    1. RZ(return to zero) by using pulse signaling
    2. NRZ(non return to zero) transmission by using level signaling
    3. Manchester encoding by using phase signaling
    4. NRZ-I(non return to zero-invertive) by using bandwidth 
    5. All of these
  2. What are the two types of systems that are used to provide timing signal

    1. Asynchronous communications
    2. Synchronous communications
    3. Both  a & b
    4. None of these

  1. The timing signal identifies the boundaries between the

    1. Bytes
    2. Bits
    3. Gigabyte
    4. Megabyte

  1. Which bit stream is to be transmitted with the objective that when the sending side sends _____ bit

    1. 1
    2. 0
    3. 1,0
    4. None of these

  1. Which bit stream is to be transmitted with the objective that when the received by the receiving side as 1 bit, not as ___ bit

    1. 1
    2. 0
    3. 1,0
    4. None of these

  1. It defines the electrical and mechanical aspects of interfacing to a physical medium for transmitting data ________________________________

    1. As well as setting up
    2. Maintaining
    3. Disconnecting physical links
    4. All of these

  1. The functions of the physical layer are
    1. Describing hardware specifications
    2. Encoding and signaling
    3. Data transmission and reception
    4. All of these
  2. The physical layer supports various encoding and signaling functions to convert data, from bit stream to frame and vice versa, to send across the network
    1. Describing hardware specifications
    2. Encoding and signaling
    3. Data transmission and reception
    4. None of these
  3. What is an example of a physical layer definition

    1. RS-323C/D
    2. RS-232C/D
    3. RS-233C/D
    4. RS-322C/D

  1.  Examples of data link layers are

    1. HDLC
    2. Ethernet
    3. Both a & b
    4. None of these

  1. The functions of the data link layer are
    1. Logical Link control(LLC)
    2. Media Access Control(MAC)
    3. Data framing
    4. Addressing
    5. Error detection and handling
    6. All of these
  2. The data link layer also deals with the issue of addressing what is popularly known as

    1. Hardware
    2. Address
    3. MAC address
    4. All of these

  1. Some of the examples of MAC are
    1. CSMA/CD for Ethernet
    2. Token passing for the Token Ring network
    3. Both a & b
    4. None of these
  2. The functions of the Network layer are

    1. Logical addressing
    2. Routing
    3. Datagram encapsulation
    4. Fragmentation and reassembly
    5. All of these

  1. The routing of network layer may be

    1. Static
    2. Dynamic
    3. Both a & b
    4. None of these

    1.  
  1. The network layer uses which service for delivering packets across the network

    1. Connection-oriented
    2. Connectionless service
    3. Both a & b
    4. None of these

  1. In broadcast network ,the routing problem is ________, so the network layer is often thin or even nonexistent

    1. Complex
    2. Simple
    3. Both a & b
    4. None of these

  1. The transport layer provides the necessary function to enable communication between _____________ processes on different computers

    1. Software application
    2. Hardware application
    3. Both a & b
    4. None of these

    1.  
  1. The transport layer accepts data from the ______ and splits it up into smaller units so that it can be passed to the network layer

    1. Network layer
    2. Session layer
    3. Presentation layer
    4. Physical layer

  1.  Which protocol uses the transport layer

    1. FTP
    2. TFTP
    3. HTTP
    4. TCP/IP

  1. The functions of transport layer are
    1. Process-level addressing
    2. Multiplexing and de-multiplexing
    3. Segmentation, packaging and reassembly
    4. Connection establishment , management and termination
    5. Acknowledgements and retransmission
    6. Flow control
    7. All of these
  2. The session layer is responsible for _______________ the dialogues between communicating applications

    1. Establishing
    2. Maintaining
    3. Arbitrating
    4. All of these

    1.  
99.  The session layer provides enhanced useful services in some applications such as

    1. Remote login
    2. Remote file transfer
    3. Both a & b
    4. None of these

  1. Some examples of APIs are

    1. NetBIOS
    2. TCP/IP sockets
    3. Remote Procedure Calls (RPCs)
    4. All of these

  1. Which enable an application to complete specified high level communications over the network successfully and easily with the help of a standardized set of services

    1. RPCs
    2. APIs
    3.  TCP/IP
    4. All of these

  1. The data link layer is also known as

    1. Link layer
    2. Data layer
    3. Open layer
    4. None of these

  1. Some example of data link layers are

    1. HDLC
    2. Ethernet
    3. Both a & b
    4. None of these

  1. Which provides link to many wireless and wired local area networking (LAN) like Ethernet ,FDDI, IEEE802.11 etc to function

    1. Physical layer
    2. Data link layer
    3. Transport layer
    4. Presentation layer

  1. Which layer is responsible for the reliable transfer of data across the physical link

    1. Physical layer
    2. Data link layer
    3. Transport layer
    4. Presentation layer

  1. The responsibility of data link layer include functions such as

    1. Data flow control
    2. Breaking the input data
    3. Frame formatting
    4. Transmission of the frame sequence
    5. Error detection
    6. Link management
    7. All of these

  1. Which layer performs functions relative to the syntax and semantics of the information transmitted

    1. Physical layer
    2. Data link layer
    3. Transport layer
    4. Presentation layer

  1. The types of data handling issue that presentation layer provides are as follows

    1. Translation
    2. Compression
    3. Encryption
    4. All of these

  1. In translation, different types of computers like _____________in an Inter-network have many distinct characteristics and represent data in different ways

    1. PCs
    2. Macintoshes
    3. UNIX systems
    4. AS/400 servers
    5. All of these

  1. Which layer allows the user to use the network

    1. Physical layer
    2. Data link layer
    3. Application layer
    4. Presentation layer

  1. The application layer provides network-based services to the user are

    1. Distributed database
    2. Electronic mail
    3. Resource sharing
    4. File transfer
    5. Remote file access
    6. Network management
    7. All of these

  1. Which layer provides user interface to communicate with a computer

    1. Physical layer
    2. Application layer
    3. Transport layer
    4. Presentation layer

  1. The most popular application layer protocols are

    1. HTTP, FTP
    2. SMTP, DHCP
    3. NFS, Telnet
    4. SNMP, POP3
    5. NNTP, IRC
    6. All of these

  1. Which model is considered the oldest protocol of all computer networks like the ARPANET and its successor, the Internet

    1. TCP/IP Reference model
    2. SMTP model
    3. Telnet model
    4. NNTP model

    1.  
  1. Most users rely on ______ for the purpose of file transfers, electronic mail(e-mail) and remote login services

    1. TCP/IP
    2. SMTP
    3. DHCP
    4. NFS

    1.  
  1. How many layers TCP/IP model has

    1. 2
    2. 3
    3. 4
    4. 5

  1. TCP/IP layer specifies the __________ layer

    1. Physical layer
    2. Application layer
    3. Transport layer
    4. Presentation layer

  1. TCP/IP defines a four-layer model consisting of the

    1. Internet layer
    2. Transport layer
    3. Application layer
    4. Network interface layer
    5. All of these

  1. TCP/IP architecture is based on the three sets of interdependent processes are

    1. Application-specific processes
    2. Host-specific processes
    3. Network-specific processes
    4. All of these

  1. Which TCP/IP standards define protocols for TCP/IP networks for layer two implementation to fill the gap between the network layer and the physical layer
    1. Serial Line Internet Protocol(SLIP)
    2. Point-to-Point Protocol(PPP)
    3. Both a & b
    4. None of these
  2. The Internet layer of the TCP/IP matches with the which layer of the OSI model

    1. Network layer
    2. Physical layer
    3. Session layer
    4. Data link layer

  1. The Packet format and protocol at internet layer is called

    1. Network protocol
    2. Internet protocol
    3. OSI protocol
    4. None of these

  1. Which protocols are found in a Internet Layer of TCP/IP model

    1. IP
    2. ICMP
    3. RIP
    4. BGP
    5. All of these

  1. Which protocols are found in a Network interface Layer of TCP/IP model

    1. Ethernet
    2. FDDI
    3. Token Ring
    4. All of these

    1.  
  1. Which protocols are found in a Transport Layer of TCP/IP model

    1. TCP
    2. UDP
    3. FDDI
    4. Both a & b

  1. Which protocols are found in a Application Layer of TCP/IP model

    1. FTP
    2. TFTP
    3. SMTP
    4. NFS
    5. TELNET
    6. SNMP
    7. All of these

    1. None of these
  1. The UDP Protocols are

    1. Reliable
    2. Connection-oriented
    3. Connectionless
    4. Unreliable
                                                               i.      Both a & b
                                                             ii.      Both c & d
                                                            iii.      None of these

  1. Which protocols are found in the application layer

    1. Numerous
    2. UDP
    3. TCP
    4. IP

  1. Which other function include __________________and identification of port number

    1. Sequence control
    2. Error recovery and control
    3. Flow control
    4. All of these

  1. TCP layer is a

    1. Service
    2. Connection type service
    3. Connectionless type service
    4. None of these

  1. The basic functions of application layer are _____________ that wish to communicate with one another
    1. To identify the source machine
    2. To identify the destination machine
    3. Both a & b
    4. None of these
  2. The Internet has definite standards for FTP that connects to a

    1. Remote machine
    2. Sends an arbitrary file
    3. Fetches an arbitrary file
    4. All of these

  1. FTP addresses the
    1. Issues of authentication
    2. Listing of directory contents
    3. ASCII or binary files
    4. All of these
  2. Another aspect of the application layer is to __________ ,this application is called telnet

    1. Login remotely
    2. Logout
    3. Remotely
    4. None of these

  1. TCP connection with another location and then pass keystrokes from the _______
    1. Remote host to local host
    2. Local host to remote host
    3. remote host to remote host
    4. Local host to Local host
  2. Similarly, there are many other applications such as NNTP enabling communication between a ___________
    1. News server
    2. News client
    3. Web(HTTP)-based protocol for communication on the WWW
    4. All of these
  3. FTP is among the oldest protocols used in the_____

    1. Internet
    2. Web
    3. Both a & b
    4. None of these

  1. Which is a file server access protocol that enables a user to transfer files between two hosts

    1. SMTP
    2. TCP
    3. FTP
    4. NNTP

  1. FTP is widely available on almost all-browsers indicating that all computing platforms, including _________
    1. DOS
    2. OS/2
    3. UNIX and up to the mainframe level have this service available
    4. All of these
  2. Which dose not require any familiarity with the remote operating system

    1. SMTP
    2. TCP
    3. FTP
    4. NNTP

    1.  
  1. Modern FTP servers known as _______

    1. TCPD
    2. FTPD
    3. SMTD
    4. CTPD

  1. FTPD support two different TCP connections namely_______

    1. Control connection
    2. Data connection
    3. Both a & b
    4. None of these

    1.  
  1. Which is invoked for the entire duration of transfer of file or FTP session

    1. Control connection
    2. Data connection
    3. Both a & b
    4. None of these

  1. Which connection is establish as and when it is required

    1. Control connection
    2. Data connection
    3. Both a & b
    4. None of these

    1.  
  1. The main function of data connection is to facilitate transfer of file and directory to and from the________
    1. Clients at the server’s request  
    2. Clients at the client’s request
    3. Server at the server’s request
    4. Server at the client’s request
  2. TFTP stands for
    1. Transfer file trivial protocol
    2. Transfer file transfer protocol
    3. Trivial file trivial protocol
    4. Trivial file transfer protocol
  3. Which is also an internet service intended for the transfer of files from one computer to another over a network

    1. TFTP
    2. FTP
    3. Both a & b
    4. None of these

  1. TFTP does not provide _____________

    1. Password protection
    2. User directory capability
    3. Both a & b
    4. None of these

  1. TFTP is simpler than the ___________ but less capable

    1. FTP
    2. SMTP
    3. NNTP
    4. FTPD

  1. Which is one of  the most popular network services

    1. Electronic message
    2. Electronic mail
    3. Electric mail
    4. None of these

    1.  
  1. Electronic mail works like an

    1. Post mail
    2. Postal mail
    3. Post card
    4. None of these

  1. E-mail has two parts namely

    1. User agent
    2. Message Transfer agent
    3. Both a & b
    4. None of these

  1. MTA stands for
    1. Message Transmission Agent
    2. Machine Transfer Agent
    3. Message Transfer Agent
    4. Mobile Transfer Agent
  2. Which is a software package that transports the message created by a user to destination mailboxes possibly on remote machines

    1. User agent
    2. MTA
    3. Both a & b
    4. None of these

  1. The MTA has to perform more complex jobs than other applications
    1. MTA distinguishes between local and remote recipients
    2. MTA needs to deliver copies of a message to several machines
    3. MTA allows mixing of text, voice appending documents, files and video in a message
    4. MTA handles temporary failures when a destination machine is temporarily unavailable
    5. All of these
  2. In MTA, e-mail address consist of the following components

    1. Mailbox names
    2. Symbolic names
    3. Group names(mail exploders)
    4. All of these

  1. Which is the user interface to the mail system

    1. User agent
    2. MTA
    3. Both a & b
    4. None of these

  1. Which refers to the name of a service rather than a specific user
    1. Mailbox names
    2. Symbolic names
    3. Group names(mail exploders)
    4. All of these
  2. Which refers to an alias for a set of recipients, that consults an internal database to specify the mail addresses
    1. Mailbox names
    2. Symbolic names
    3. Group names(mail exploders)
    4. All of these
  3. There are a number of e-mail packages available. Some of them are free like ____________________, while some are paid

    1. Google mail
    2. Yahoo mail
    3. Hotmail
    4. All of these

  1. In MTA, all of them are also not alike but most of the e-mail software have common basic functionality these are
    1. Send and receive mail messages
    2. Save your messages in a file
    3. Print mail messages
    4. Forward a mail message to other recipients
    5. Reply to mail messages
    6. Attach a file to a mail message
    7. All of these
  2. E-mail address has three parts
    1. A user identity or name
    2. An ‘at’ sign(@)
    3. The domain name, which basically specifies the address of the user’s mail server
    4. All of these
  3. SMTP is the ________ standard for an electronic mail service provider

    1. dee facto
    2. de facto
    3. de fact
    4. none of these

  1. SMTP uses ______ transport for the reliably delivery of mail messages

    1. FTP
    2. TCP
    3. MTA
    4. FTPD

  1. The SMTP server also allows _____

    1. NNTP
    2. Telnet service
    3. FTPD
    4. none of these

  1. SMTP can be considered as a complement of ______ 

    1. UUDP
    2. UUCP
    3. UCCP
    4. UCPD

  1. SMTP commands consist of human-readable __________

    1. EBCDIC strings
    2. ASCII strings
    3. Both a & b
    4. None of these

  1. MIME stands for
    1. Multipurpose Internet Machine Extensions
    2. Multiprogramming Internet Machine Extensions
    3. Multipurpose Internet Mail Extensions
    4. Multipurpose Internet Mail Exchange
  2. ________ standards were used to encode binary files for transfer through SMTP, which has now become a standard with its varied version

    1. FTPD
    2. FTP
    3. MIME
    4. UUCP

    1.  
  1. POP3 stands for
    1. Postal Office Protocol
    2. Post Office Protocol
    3. Post Office Program
    4. Posting of Protocol
  2. IMAP stands for
    1. Internet Machine Access Protocol
    2. Internet Message Access Protocol
    3. Internet Multipurpose Access Protocol
    4. Inkjet Message Access Protocol
  3. Which one is a push kind of protocol

    1. SMTP
    2. POP3
    3. IMAP
    4. All of these

  1. Which one is a pull kind of protocol

    1. SMTP
    2. POP3
    3. IMAP
    4. Both b & c

  1. Telnet can also be used to connect other ports serving as _____________

    1. User-defined services
    2. Well-known services
    3. Both a & b
    4. None of these

  1. Telnet works as a _____________ model where it establishes a virtual connection by using the TCP transport protocol

    1. User-defined
    2. Well-known
    3. Client-server
    4. All of these

    1.  
  1. The Telnet program requires two arguments
    1. The name of a computer on which the server runs
    2. The protocol port number of the server
    3. Both a & b
    4. None of these
  2. ______________ to support centralized terminal management can support
    1. Transfer binary data
    2. Support byte macros
    3. Emulate graphics terminals
    4. Convey information
    5. All of these
  3. Telnet service is unique in the manner that is ___________ like other TCP/IP services

    1. Platform-specific
    2. Not platform-specific
    3. Platform-service
    4. None of these

  1. 0Some of the Telnet commands are as follows
Interrupt Process(IP)
It terminates the running program
Abort output(AO)
It refers to discarding of any buffered output
Are You there(AYT)
This command allows a client to send an out-of-band query to verify whether the remote end is still there
Erase character(EC)
It refers to the erasing of the previous character
Erase line(EL)
It deletes the entire current line
Synchronize
It clears the data path to the remote party
Break
It is equivalent to the BREAK or ATTENTION key
  1. Novell NetWare is a ___________ network operating system that was created by Novell, Inc

    1. Client type
    2. Server type
    3. Both a & b
    4. None of these

  1. Novell NetWare uses a protocol stack having _____

    1. 3 layers
    2. 4 layers
    3. 5 layers
    4. 6 layers

  1.  IPX stands for
    1. Internet Packet Exchange
    2. Inter-network Packet Exchange
    3. Inter-network Protocol Exchange
    4. Internet Package Exchange
  2. _______ is a networking protocol used by the Novell NetWare operating systems for performing connectionless communication

    1. NVT
    2. IPX
    3. IP
    4. FTP

  1. The rise 1985 saw the rise of Novell NetWare when _____________ were launched
    1. NetWare 286 2.0a
    2. Intel 80,286 16-bit processor
    3. Both a & b
    4. None of these
  2. Two methods of operation were supported by NetWare 286 2.x namely are

    1. Dedicated
    2. Non-dedicated
    3. Both a & b
    4. None of these

    1.  
  1. Beginning with NetWare 3.x, assistance for _____ protected mode was included, removing the 16MB memory limit of NetWare 286

    1. 16-bit
    2. 32-bit
    3. 64-bit
    4. 128-bit

  1. Which managed all functions and was activated at startup  or at the time of requirement
    1. NLM(NetWare Loadable Module)
    2. FTP
    3. SMTP
    4. FTPD
  2. A set of protocols used in the communication network can be termed as

    1. Protocol
    2. Protocol stack
    3. Protocol layer
    4. None of these

    1.  
  1. According to RFC 1122 the TCP/IP consists of ________

    1. 2 layers
    2. 3 layers
    3. 4 layers
    4. 5 layers

    1.  
  1. The lowest layers of the TCP/IP establishes communication with

    1. Upper layer
    2. Physical media
    3. Next layer
    4. Protocol

  1. When data travels downwards from upper the layer in TCP/IP, each upper layer attaches a

    1. Footer
    2. Header
    3. Standard
    4. None of these

    1.  
  1. After the transmission of data in bit form to another machine it travels upward, ____________ the header till data reaches the application layer

    1. Stripping in
    2. Stripping off
    3. Tackling off
    4. Tackling in

    1.  
  1. In which year, Netware directory service were added to the Netware version 4

    1. 1993
    2. 1996
    3. 1998
    4. 2001

  1. In which year. Version 4.11 was launched by Novell

    1. 1993
    2. 1996
    3. 1998
    4. 2001

  1. In which year, NetWare5 was launched in October

    1. 1993
    2. 1996
    3. 1998
    4. 2001

  1. In which year, NetWare6 was launched

    1. 1993
    2. 1996
    3. 1998
    4. 2001

    1.  
  1. Every  protocol with a certain from of contact is known as

    1. Protocol stack
    2. Protocol suite
    3. Stack
    4. Suite

  1. Which is a file server access protocol that enables a user to transfer file between two hosts, across the network or Internet using TCP

    1. FTPD
    2. FTP
    3. Telnet
    4. PPP

  1. Which is  a remote terminal protocol that enables a user at one location to establish a TCP connection with another location

    1. FTPD
    2. FTP
    3. Telnet
    4. PPP

  1. Which protocol is used by network computers operating system for sending error messages

    1. FTPD
    2. FTP
    3. Telnet
    4. ICMP

7 comments :