Chapter 10: Data Communication and Internet Services (Set-5)

In a TCP connection, the receiver can detect missing data primarily using

A MAC addresses
B DNS records
C Subnet masks
D Sequence numbers

Which TCP mechanism prevents a fast sender from overwhelming a slow receiver

A Flow control
B Name resolution
C Proxy caching
D NAT mapping

TCP congestion control mainly tries to prevent

A DNS poisoning
B IP exhaustion
C Network overload
D Email spoofing

In IP networking, fragmentation is needed when

A Packet exceeds MTU
B DNS TTL is low
C TCP uses ACK
D DHCP lease ends

Path MTU discovery is mainly used to

A Increase bandwidth
B Avoid fragmentation
C Create DNS zones
D Speed up DHCP

In DNS, “recursive query” means the server must

A Return final answer
B Return only referral
C Block all caching
D Change zone records

Which DNS behavior can cause users to still see an old IP after a website changes servers

A NAT translation
B FTP active mode
C Cached DNS entries
D TCP handshake

A DNS “negative cache” stores the result of

A Subnet calculation
B Non-existent domain
C Port forwarding
D TLS certificate

DHCP “reservation” is best described as

A Random IP each time
B DNS alias record
C Proxy login method
D Fixed IP for MAC

A device can have correct IP and subnet mask but still fail to access internet if

A Gateway is wrong
B DNS cache is high
C UDP is used
D HTTP is enabled

A device can reach websites by IP but not by name when

A MTU is small
B NAT is enabled
C DNS server missing
D TCP is reliable

In HTTP, a stateless protocol means the server

A Uses no headers
B Blocks all cookies
C Requires VPN always
D Stores no client state

A common reason websites use sessions instead of storing all data in cookies is

A Keep data server-side
B Increase DNS speed
C Reduce MTU size
D Avoid TCP ACK

In HTTP/1.0, which header value was commonly used to request a persistent connection

A Host header
B Cookie header
C Connection: keep-alive
D Cache-Control header

In HTTPS, “certificate mismatch” warning commonly appears when

A Port 80 is used
B Domain name differs
C DNS TTL is low
D DHCP lease expired

In TLS, integrity protection mainly ensures

A Data not altered
B Data always compressed
C IP never changes
D DNS never caches

In FTP, why is passive mode often preferred over active mode for clients behind NAT

A Server initiates data
B DNS handles data
C Client initiates data
D TCP avoids handshake

FTP control and data separation can create firewall issues mainly because

A DNS TTL changes
B MAC addresses change
C Cookies expire fast
D Data ports vary

In networking, a “well-known port” generally falls in range

A 0 to 1023
B 1024 to 49151
C 49152 to 65535
D 65000 to 65535

Which port is used by DNS queries in most cases

A Port 80
B Port 53
C Port 110
D Port 143

Email retrieval over a secure POP3 connection commonly uses

A Port 25
B Port 53
C Port 995
D Port 587

Email synchronization over a secure IMAP connection commonly uses

A Port 993
B Port 110
C Port 21
D Port 80

Secure web browsing commonly uses HTTPS on

A Port 80
B Port 25
C Port 21
D Port 443

Which technique allows multiple internal devices to share one public IP using different port numbers

A DNS caching
B FTP upload
C PAT translation
D TLS handshake

In a web proxy, “forward proxy” means it acts on behalf of

A Web servers
B Client users
C DNS root
D DHCP clients

A “reverse proxy” typically sits in front of

A Client browsers
B DNS resolvers
C DHCP pools
D Backend servers

VPN tunneling mainly works by

A Encapsulating packets
B Removing all headers
C Changing DNS zones
D Disabling routing

In network troubleshooting, high “jitter” is especially harmful for

A DNS caching
B DHCP leasing
C VoIP audio calls
D Static websites

In VoIP, which issue causes missing sound when packets arrive too late for playback

A DNS recursion
B Packet loss effect
C NAT exhaustion
D FTP timeout

Traceroute shows hops mainly because routers send

A ICMP time exceeded
B SMTP delivery report
C DNS authoritative reply
D FTP control response

If traceroute stops after a certain hop but browsing still works, a likely reason is

A DNS failure
B DHCP expired
C ICMP blocked
D NAT disabled

In HTTP/1.1, persistent connections reduce overhead mainly by

A Removing DNS queries
B Shortening IP headers
C Disabling caching
D Reusing TCP connection

A 304 HTTP response code generally means

A Not found
B Not modified
C Permanent redirect
D Server error

An HTTP 429 status code is commonly related to

A Page not found
B Unauthorized user
C Too many requests
D Bad gateway

In DNS, a “CNAME chain” can slightly slow resolution because it

A Requires extra lookups
B Removes TTL entirely
C Breaks IP routing
D Changes subnet mask

DNSSEC is primarily designed to protect against

A NAT translation issues
B FTP login failures
C DNS spoofing attacks
D DHCP renewal delays

DHCP can fail for a client if the network blocks

A TLS handshake
B DNS caching
C FTP passive ports
D Broadcast discovery

A DHCP relay agent is mainly used when

A Server is different subnet
B DNS is offline
C NAT is disabled
D HTTP is encrypted

In IP networks, the “default route” is used when

A DNS record missing
B Cookie expired
C No specific route matches
D FTP login fails

When an HTTPS site is accessed, SNI helps the server to

A Assign dynamic IP
B Choose correct certificate
C Increase bandwidth
D Shorten URL path

A major security risk of accepting invalid HTTPS certificates is

A Man-in-middle attack
B Faster browsing speed
C Better DNS caching
D Higher bandwidth

In email delivery, why do many servers verify reverse DNS of sending IP

A Increase bandwidth
B Improve NAT speed
C Reduce spam risk
D Shorten TTL values

A website can still load even if DNS is down on your network if

A IP is cached
B NAT is disabled
C DHCP expired
D FTP is active

In NAT environments, some protocols struggle because they embed IP/port inside data; the common fix is

A DNS CNAME record
B Application-aware gateway
C DHCP reservation
D HTTP caching

For secure remote administration file transfer, the safest basic choice is

A FTP protocol
B HTTP protocol
C POP3 protocol
D SFTP protocol

In TCP, the “window size” mainly controls

A DNS cache duration
B IP address length
C Unacked data allowed
D HTTP redirect count

A common cause of low throughput on high-bandwidth, high-latency links is

A Small TCP window
B High DNS TTL
C Short URL path
D Low MAC value

In HTTP, why is GET considered less suitable for sending sensitive data than POST

A GET is encrypted
B POST uses UDP
C GET blocks cookies
D URL can be logged

A key difference between HTTP and HTTPS is that HTTPS provides

A Automatic IP assignment
B Authentication of server
C Packet fragmentation
D DNS zone updates

In DNS, which record is most directly used to prove domain ownership for some services

A PTR record
B MX record
C TXT record
D SRV record

Leave a Reply

Your email address will not be published. Required fields are marked *