APPLICATION LAYER
1.
Which is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP
b) SMTP
c) FTP
d) TCP
Answer: d
Explanation: TCP is transport layer protocol
Explanation: TCP is transport layer protocol
2.
The packet of information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame
a) Packet
b) Message
c) Segment
d) Frame
Answer: b
Explanation: None.
Explanation: None.
3.
This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
Answer: d
Explanation: HTTP is a protocol.
Explanation: HTTP is a protocol.
4.
Application developer has permission to decide the following on transport layer
side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
Answer: c
Explanation: None.
Explanation: None.
5.
Application layer offers _______ service
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
Answer: a
Explanation: None.
Explanation: None.
6.
E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.
Explanation: Because it can work with available throughput.
7.
Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games
a) File transfer
b) File download
c) E-mail
d) Interactive games
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
Explanation: Internet telephony is Loss-tolerant other applications are not.
8.
Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Answer: d
Explanation: None.
Explanation: None.
9.
To deliver a message to the correct application program running on a host, the
_______ address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
Explanation: None.
Explanation: None.
10.
This is a time-sensitive service
a) File transfer
b) File download
c) E-mail
d) Internet telephony
a) File transfer
b) File download
c) E-mail
d) Internet telephony
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
Explanation: Internet telephony is Loss-tolerant other applications are not.
11.
Transport services available to applications in one or another form
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Answer: d
Explanation: None.
Explanation: None.
12.
Electronic mail uses this Application layer protocol
a) SMTP
b) HTTP
c) FTP
d) SIP
a) SMTP
b) HTTP
c) FTP
d) SIP
Answer: a
Explanation: None.
Explanation: None.
13.
FTP stands for
a) File Transfer Protocol
b) File Transmission Protocol
c) Both A and B
d) None
a) File Transfer Protocol
b) File Transmission Protocol
c) Both A and B
d) None
Answer: a
Explanation: None
Explanation: None
14.
DHCP stands for
a) Dynamic Host Configuration Protocol
b) Data Host Confirmation Protocol
c) Both A and B
d) None
a) Dynamic Host Configuration Protocol
b) Data Host Confirmation Protocol
c) Both A and B
d) None
Answer: a
Explanation: None
Explanation: None
15.
Fully Qualified Domain Name is terminated by
a) null string
b) Dot(.)
c) /
d) Both A and B
a) null string
b) Dot(.)
c) /
d) Both A and B
Answer: d
Explanation: None
Explanation: None
16.
BCC stands for
a) Black Carbon Copy
b) Blind Carbon Copy
c) Both A and B
d) None
a) Black Carbon Copy
b) Blind Carbon Copy
c) Both A and B
d) None
Answer: b
Explanation: None
Explanation: None
17.
Which protocol is responsible for dynamically allocating IP addresses to
devices in the network
a) DNS
b) DHCP
c) IP
d) None
a) DNS
b) DHCP
c) IP
d) None
Answer: b
Explanation: None
Explanation: None
18.
HTTP stands for
a) Hyper Text Transfer Protocol
b) Hyper Text Transmission Protocol
c) Both A and B
d) None
a) Hyper Text Transfer Protocol
b) Hyper Text Transmission Protocol
c) Both A and B
d) None
Answer: a
Explanation: None
Explanation: None
a) SMTP
b) SNMP
c) FTP
d) None
b) SNMP
c) FTP
d) None
Answer: b
Explanation: None
Explanation: None
20.
Application layer is________________ of OSI reference model
a) 5th Layer
b)7th Layer
c) 4th Layer
d) None
a) 5th Layer
b)7th Layer
c) 4th Layer
d) None
Answer: b
Explanation: None
Explanation: None