Chapter 10: Data Communication and Internet Services (Set-8)

In a noisy wireless link, which approach most directly improves reliability without changing bandwidth

A Longer URL paths
B Lower DNS TTL
C Static IP only
D Error detection codes

When data is converted into a signal suitable for a particular medium, the process is called

A Encoding process
B Name resolution
C Port forwarding
D Cache validation

In full-duplex Ethernet, collisions are avoided mainly because

A DNS caching enabled
B DHCP lease fixed
C Separate transmit paths
D HTTP uses GET

Which OSI layer is most responsible for converting network addresses to local physical delivery on a LAN

A Application layer
B Session layer
C Presentation layer
D Data Link layer

A router makes forwarding decisions mainly based on

A Destination MAC only
B Destination IP address
C Cookie value
D DNS record type

In TCP/IP, encapsulation means data is wrapped with

A Only MAC addresses
B Only DNS responses
C Layer-specific headers
D Only DHCP options

A key reason TCP is slower than UDP in some cases is because TCP

A Uses connection setup
B Uses no headers
C Avoids acknowledgments
D Sends no segments

DNS primarily converts

A IP to MAC
B MAC to port
C Port to URL
D Domain to IP

A DNS “cache” is used mainly to

A Encrypt all queries
B Change domain ownership
C Speed repeated lookups
D Reduce bandwidth limits

The “DHCP offer” message is sent by the

A DNS resolver
B DHCP server
C Web browser
D FTP client

DHCP helps prevent manual configuration mistakes by

A Auto assigning settings
B Forcing static IP
C Disabling DNS cache
D Encrypting SMTP

The main job of a subnet mask is to

A Encrypt web traffic
B Assign MAC addresses
C Block DNS queries
D Define network boundary

The default gateway is required when accessing

A Local LAN devices
B Only DNS server
C Outside subnet networks
D Same IP host

HTTPS provides security mainly by using

A TLS encryption
B UDP routing
C DHCP lease time
D DNS recursion

Which item most directly confirms a website identity during HTTPS setup

A Subnet mask
B MAC address
C FTP username
D Digital certificate

In a URL, the “path” part mainly identifies

A DNS server name
B Router interface
C Resource location
D IP lease time

In HTTP, a “status code” mainly tells

A Packet size limit
B Request result meaning
C DNS cache time
D DHCP pool size

HTTP 301 is used for

A Temporary redirect
B Server failure
C Permanent redirect
D Unauthorized access

Cookies are mainly used to store

A DNS zone data
B Routing table info
C Modulation settings
D Small client state

A session ID is commonly stored in a

A Browser cookie
B DNS record
C DHCP lease
D Router table

FTP is a protocol mainly used to

A Resolve names
B Encrypt web traffic
C Transfer files
D Assign dynamic IP

The standard FTP control port is

A Port 25
B Port 21
C Port 80
D Port 443

SFTP is best described as

A Web page protocol
B Name mapping service
C Dynamic IP method
D Secure file transfer

Port 25 is commonly associated with

A HTTP browsing
B DNS queries
C SMTP mail transfer
D FTP control

POP3 is mainly used to

A Retrieve email
B Send email
C Host websites
D Assign addresses

IMAP is mainly used to

A Transfer files
B Route packets
C Encrypt websites
D Sync email mailbox

The ping command uses

A SMTP commands
B HTTP headers
C ICMP messages
D FTP control codes

Traceroute works mainly by analyzing

A TTL expirations
B Cookie lifetimes
C DHCP renewals
D DNS records

A proxy server can improve performance using

A Increasing noise level
B Changing MAC address
C Reducing bandwidth
D Caching web content

A VPN is mainly used to provide

A Faster DNS lookup
B Encrypted private tunnel
C Longer DHCP lease
D Higher attenuation

NAT is widely used because it

A Removes encryption need
B Replaces routing tables
C Saves public IPv4
D Stops packet switching

A MAC address is used mainly within

A Global internet routing
B DNS root network
C Web application layer
D Local LAN segment

An ISP provides users with

A Internet connectivity
B DNS record signing
C Packet segmentation
D TCP sequencing

Web hosting means

A Assigning static MAC
B Mapping IP to MAC
C Storing site online
D Modulating signals

VoIP sends voice as

A DNS zone entries
B DHCP lease values
C TCP window sizes
D IP data packets

The purpose of “protocol suite” is to provide

A Only one protocol
B Multiple working protocols
C Only cables rules
D Only MAC mapping

Data link frames usually include

A Only domain name
B Only IP address
C Source and destination MAC
D Only URL path

A packet’s IP header typically includes

A Source and destination IP
B Source MAC only
C DNS TTL value
D HTTP status code

A common reason for low throughput is

A Longer domain name
B Larger subnet mask
C Congestion and retransmits
D More cookies saved

A browser padlock icon usually indicates

A DNS is disabled
B DHCP is stopped
C FTP is secure
D HTTPS is active

HTTP is called “stateless” because it

A Encrypts every request
B Remembers nothing by default
C Uses only UDP
D Requires DHCP always

SMTP, POP3, and IMAP are all related to

A Web browsing
B File transfers
C Email services
D IP leasing

Which pair is correctly matched with web ports

A HTTP 25, HTTPS 53
B HTTP 21, HTTPS 110
C HTTP 143, HTTPS 995
D HTTP 80, HTTPS 443

FTP can be risky on public networks mainly because

A Plain text credentials
B Uses too much DNS
C Needs subnet mask
D Uses MAC routing

A common benefit of DNS is that it

A Encrypts all traffic
B Prevents NAT use
C Avoids remembering IPs
D Removes all noise

DHCP is helpful in large networks because it

A Increases attenuation
B Reduces manual setup
C Removes routing needs
D Blocks traceroute

HTTP redirects are useful when

A DNS is broken
B Subnet is wrong
C MAC is missing
D URL has changed

In TCP/IP, the “application layer” includes protocols like

A IP and ARP
B Ethernet and Wi-Fi
C HTTP and DNS
D CRC and FEC

A “resolver” in DNS is the component that

A Finds IP for name
B Assigns IP lease
C Encrypts web pages
D Transfers files

A common reason to use caching in networks is

A Increase packet loss
B Increase signal noise
C Reduce repeated requests
D Change MAC address

Leave a Reply

Your email address will not be published. Required fields are marked *