Cn Objective
Cn Objective
A) Application Layer
C) Packets
C) DNS
6. Which of the following control fields in TCP header is used to specify whether the sender
has no more data to transmit?
A) FIN
B) Winsock
9. The ability of a single network to span multiple physical networks is known as_________.
A) Subnetting
10. A _________ that limits packet duplication by including a unique identifier in each
packet to avoid retransmitting the same packet.
A) Flooding
11. To deliver a message to the correct application program running on a host, the ____
address must be consulted.
C) Port
A) Network layer
14. Suppose you are browsing the web using a web browser and trying to access the web
servers. What is the underlying protocol and port number being used?
B) TCP, 80
C) DNS
16. Which protocol is typically used to retrieve emails from the server after SMTP delivers
them?
A) POP3 or IMAP
17. An ACK number of 1000 and sequence number is 0 in TCP always means that:
20. Which one of the following is not a function of the network layer?
D) Error control
21. A subnet of a network that includes all the routers but contains no loops is called:
A) Spanning tree
D) TCP
23. The process of combining multiple signals into one shared communication medium or
channel.
C) Multiplexing
C) Elastic application
26. Which one of the following protocols delivers/stores mail to the receiver server?
A) Base64 encoding
28. Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?
29. Which of the following transmission directions listed is not a legitimate channel?
D) Double Duplex
1. Firewall
32. Software programs that allow you to legally copy files and give them away at no cost are
called which of the following?
4. Public domain
3. 65535
34. When the mail server sends mail to other mail servers, it becomes:
1. SMTP client
5. 128.64.0.0
36. Which of the following servers allows LAN users to share data?
3. File server
38. Which of the following layers does the HTTP protocol work on?
3. Application layer
255.255.0.0
2. Maximum size of an IPv4 packet would be______________.
65,535 bytes
32 bits
4. In___________ routing algorithm, routers are classified into groups called regions.
Hierarchical
Socket
Congestion control
8. SMTP operates at the ____________________ layer of the OSI model.
Application
Socket
DELETE
11. ____________ refers to the process of transmitting audio or video content over the
internet in real-time, allowing playback without downloading the entire file.
Streaming
Message
255.255.0.0
Packets
Multiplexing
18. ____________ helps manage network traffic to prevent excessive data from causing
bottlenecks, a feature of TCP.
Flow control
HTTP
20. ______________ is the temporary storage of data before playback to ensure smooth
streaming.
Buffering
21. A _______________ protocol that establishes a connection before data transfer and
ensures reliable communication.
TCP
22. The ___________________ translates internet domain and host names to IP addresses.
24. The secure version of HTTP uses the protocol ______ for encryption.
IP (Internet Protocol)
Multipath
28. A client of the DNS (Domain Name System) application is called _____.
Resolver
Physical address
IS-95
33. _________ does not require power to forward the signals?
37. ________ types of messages open a TCP connection to a peer and authenticate the
sender.
SYN
39. The network with network layer connectionless service is called ______________
network.
Datagram network