Application Layer Protocols

Question 1
Assume that you have made a request for a web page through your web browser to a web server. Initially the browser cache is empty. Further, the browser is configured to send HTTP requests in non-persistent mode. The web page contains text and five very small images.The minimum number of TCP connections required to display the web page completely in your browser is__________.
A
1
B
6
C
5
D
2
GATE CSE 2020   Computer Network
Question 2
Which of the following protocol pairs can be used to send and retrieve e-mails (in that order)?
A
IMAP POP3
B
SMTP, POP3
C
SMTP, MIME
D
IMAP, SMTP
GATE CSE 2019   Computer Network
Question 3
What is WPA?
A
wired protected access
B
wi-fi protected access
C
wired process access
D
wi-fi process access
ISRO CSE 2017   Computer Network
Question 4
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?
A
IPSec
B
NetSec
C
PacketSec
D
SSL
ISRO CSE 2017   Computer Network
Question 5
Which of the following protocol is used for transferring electronic mail messages from one machine to another?
A
TELNET
B
FTP
C
SNMP
D
SMTP
ISRO CSE 2017   Computer Network
Question 6
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
A
DNS lookup
B
DNS hijacking
C
DNS spoofing
D
None of the mentioned
ISRO CSE 2016   Computer Network
Question 7
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server,assuming that the host has just been restarted.
A
HTTP GET request, DNS query, TCP SYN
B
DNS query, HTTP GET request, TCP SYN
C
DNS query,TCP SYN, HTTP GET request
D
TCP SYN, DNS query, HTTP GET request
GATE CSE 2016 SET-2   Computer Network
Question 8
Which of the following is/are example(s) of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
A
(i) and(ii)only
B
(ii) and(iii)only
C
(ii) and(iv)only
D
(iv)only
GATE CSE 2016 SET-1   Computer Network
Question 9
Which statement is false?
A
PING is a TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine being PINGED
B
If the machine is connected and running a TCP/IP protocol stack, it should respond to the PING datagram with a datagram of its own
C
If PING encounters an error condition, an ICMP message is not returned
D
PING display the time of the return response in milliseconds or one of several error message
ISRO CSE 2015   Computer Network
Question 10
The DNS maps the IP address to
A
A binary address as strings
B
A n alphanumeric address
C
A hierarchy of domain names
D
A hexadecimal address
ISRO CSE 2015   Computer Network
There are 10 questions to complete.

2 thoughts on “Application Layer Protocols”

Leave a Comment

Like this FREE website? Please share it among all your friends and join the campaign of FREE Education to ALL.