InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which one of the following is not correct?(a) telnet is a general purpose client-server program(b) telnet lets user access an application on a remote computer(c) telnet can also be used for file transfer(d) telnet can be used for remote loginI got this question in an internship interview.My enquiry is from Telnet in section Application Layer of Computer Network |
|
Answer» RIGHT choice is (c) telnet can also be used for file TRANSFER For explanation: File Transfer Protocol is used for file transfer. Telnet PROVIDES access to the command-line interface on a REMOTE host. |
|
| 2. |
In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?(a) default mode(b) character mode(c) server mode(d) command modeThis question was addressed to me during an online interview.This intriguing question comes from Telnet in division Application Layer of Computer Network |
|
Answer» Correct answer is (a) default MODE |
|
| 3. |
Which of the following is true for character mode operation of telnet implementation?(a) each character typed is sent by the client to the server(b) each character typed is discarded by the server(c) each character typed is aggregated into a word and then sent to the server(d) each character type is aggregated into a line and then sent to the serverThe question was asked in an online quiz.My question is based upon Telnet topic in chapter Application Layer of Computer Network |
|
Answer» Correct option is (a) each character typed is SENT by the client to the server |
|
| 4. |
The decimal code of Interpret as Command (IAC) character is _______(a) 252(b) 253(c) 254(d) 255This question was posed to me in final exam.My doubt stems from Telnet in portion Application Layer of Computer Network |
|
Answer» Right choice is (d) 255 |
|
| 5. |
AbsoluteTelnet is a telnet client for _______ Operating system.(a) windows(b) linux(c) mac(d) ubuntuI had been asked this question by my college director while I was bunking the class.This interesting question is from Telnet topic in section Application Layer of Computer Network |
|
Answer» The correct ANSWER is (a) windows |
|
| 6. |
All telnet operations are sent as ________(a) 4 bits(b) 8 bits(c) 16 bits(d) 32 bitsI have been asked this question in unit test.Asked question is from Telnet in section Application Layer of Computer Network |
|
Answer» Right answer is (B) 8 bits |
|
| 7. |
Which one of the following is not true?(a) telnet defines a network virtual terminal (NVT) standard(b) client programs interact with NVT(c) server translates NVT operations(d) client can transfer files using to remote server using NVTThe question was asked during an online exam.I'm obligated to ask this question of Telnet in chapter Application Layer of Computer Network |
|
Answer» Correct choice is (d) client can TRANSFER files using to remote server using NVT |
|
| 8. |
Telnet protocol is used to establish a connection to __________(a) TCP port number 21(b) TCP port number 22(c) TCP port number 23(d) TCP port number 25I got this question in an online interview.My question is from Telnet topic in division Application Layer of Computer Network |
|
Answer» The correct option is (c) TCP port NUMBER 23 |
|
| 9. |
If we want that a character be interpreted by the client instead of server _________(a) interpret as command (IAC) escape character has to be used(b) control functions has to be disabled(c) it is not possible(d) cli character has to be usedThis question was posed to me during an online exam.Query is from Telnet in section Application Layer of Computer Network |
|
Answer» The correct answer is (a) interpret as command (IAC) ESCAPE character has to be used |
|
| 10. |
Which operating mode of telnet is full duplex?(a) default mode(b) server mode(c) line mode(d) character modeThis question was posed to me in my homework.My question comes from Telnet in division Application Layer of Computer Network |
|
Answer» Right answer is (c) line mode |
|
| 11. |
Which one of the following is not correct?(a) telnet is a general purpose client-server program(b) telnet lets user access an application on a remote computer(c) telnet can also be used for file transfer(d) telnet can be used for remote loginI have been asked this question during an interview.Enquiry is from Telnet in chapter Application Layer of Computer Network |
|
Answer» Correct answer is (c) TELNET can also be USED for file transfer |
|
| 12. |
Telnet is used for _______(a) Television on net(b) Network of Telephones(c) Remote Login(d) Teleshopping siteThe question was asked during an internship interview.The question is from Telnet topic in section Application Layer of Computer Network |
|
Answer» CORRECT choice is (c) REMOTE Login The explanation is: Telnet is an application layer PROTOCOL that provides access to the command LINE INTERFACE of a remote computer that can be used to perform remote login. |
|
| 13. |
What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?(a) telnet//www.sanfoundry.com(b) telnet:www.sanfoundry.com(c) telnet://www.sanfoundry.com(d) telnet www.sanfoundry.comI had been asked this question in an interview.This intriguing question comes from Telnet topic in division Application Layer of Computer Network |
|
Answer» Correct answer is (c) telnet://www.sanfoundry.com |
|
| 14. |
_______ allows you to connect and login to a remote computer(a) Telnet(b) FTP(c) HTTP(d) SMTPThe question was posed to me in exam.My doubt is from Telnet topic in section Application Layer of Computer Network |
|
Answer» Correct option is (a) TELNET |
|
| 15. |
Which amongst the following statements is correct for “character at a time” mode?(a) Character processing is done on the local system under the control of the remote system(b) Most text typed is immediately sent to the remote host for processing(c) All text is echoed locally, only completed lines are sent to the remote host(d) All text is processed locally, and only confirmed lines are sent to the remote hostI have been asked this question in an interview for internship.I want to ask this question from Telnet in section Application Layer of Computer Network |
|
Answer» CORRECT CHOICE is (b) Most text typed is immediately sent to the REMOTE host for processing For explanation: In character at a time mode, the typed text is sent immediately to the remote host while the user is typing. Another mode USED in TELNET is “Old line by line” mode in which only completed lines are sent to the remote host. |
|
| 16. |
The application layer protocol used by a Telnet application is ________(a) Telnet(b) FTP(c) HTTP(d) SMTPThis question was addressed to me by my college professor while I was bunking the class.I want to ask this question from Telnet in portion Application Layer of Computer Network |
|
Answer» Right CHOICE is (a) Telnet |
|
| 17. |
Structure of Management Information (SMI), is the guideline of ________(a) HTTP(b) SNMP(c) URL(d) MIBI have been asked this question at a job interview.This interesting question is from SNMP in portion Application Layer of Computer Network |
|
Answer» CORRECT option is (B) SNMP Explanation: SMI was developed by the Storage Networking Industry Association (SNIA) and it defines a standard that can be manipulated by SNMP. Basically, it defines the standard format and hierarchy of management data which is used by the SNMP. It does not describe how the objects are to be MANAGED. |
|
| 18. |
SNMP is the framework for managing devices in an internet using the ______(a) TCP/IP protocol(b) UDP(c) SMTP(d) NoneI had been asked this question in an online quiz.The above asked question is from SNMP topic in division Application Layer of Computer Network |
|
Answer» RIGHT choice is (a) TCP/IP protocol To elaborate: SNMP is a management protocol in which a few manager stations CONTROL a set of agents USING the TCP/IP protocol suite. SNMP stands for Simple NETWORK Management Protocol. |
|
| 19. |
Control of the users’ access to network resources through charges is the main responsibility of ________(a) Reactive Fault Management(b) Reconfigured Fault Management(c) Accounting Management(d) Security ManagementI had been asked this question at a job interview.This is a very interesting question from SNMP topic in division Application Layer of Computer Network |
|
Answer» The correct answer is (C) Accounting Management |
|
| 20. |
BER stands for ________(a) Basic Encoding Rules(b) Basic Encoding Resolver(c) Basic Encoding Rotator(d) Basic Encoding RouterThis question was posed to me during an interview for a job.I would like to ask this question from SNMP topic in section Application Layer of Computer Network |
|
Answer» Right option is (a) BASIC Encoding Rules |
|
| 21. |
In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________(a) Fault Management(b) Secured Management(c) Active Management(d) Security ManagementI have been asked this question during an internship interview.This intriguing question originated from SNMP in chapter Application Layer of Computer Network |
|
Answer» The CORRECT option is (d) SECURITY Management |
|
| 22. |
The main difference between SNMPv3 and SNMPv2 is _______(a) Management(b) Integration(c) Classification(d) Enhanced securityThe question was asked in a national level competition.I'd like to ask this question from SNMP topic in section Application Layer of Computer Network |
|
Answer» The correct option is (d) Enhanced security |
|
| 23. |
To use a Simple Network Management System, we need _______(a) Servers(b) IP(c) Protocols(d) RulesThe question was posed to me in an interview.This interesting question is from SNMP topic in chapter Application Layer of Computer Network |
|
Answer» Correct option is (d) Rules |
|
| 24. |
Configuration management can be divided into which two subsystems?(a) Reconfiguration and documentation(b) Management and configuration(c) Documentation and dialing up(d) Configuration and dialing upThis question was posed to me in class test.My question comes from SNMP in division Application Layer of Computer Network |
|
Answer» The correct option is (a) Reconfiguration and documentation |
|
| 25. |
Full duplex mode increases the capacity of each domain by ________(a) 10 to 20 mbps(b) 20 to 30 mbps(c) 30 to 40 mbps(d) 40 to 50 mbpsThe question was posed to me during an online exam.Asked question is from SNMP in chapter Application Layer of Computer Network |
|
Answer» The correct answer is (a) 10 to 20 mbps |
|
| 26. |
The application-level protocol in which a few manager stations control a set of agents is called ______(a) HTML(b) TCP(c) SNMP(d) SNMP/IPI had been asked this question in an interview for job.Enquiry is from SNMP in chapter Application Layer of Computer Network |
|
Answer» The correct option is (c) SNMP |
|
| 27. |
SMI-S Standard uses which of the following?(a) Java RMI(b) CIM-XML/HTTP(c) CORBA(d) .NETThis question was addressed to me in an online interview.My enquiry is from SMI topic in section Application Layer of Computer Network |
|
Answer» RIGHT answer is (b) CIM-XML/HTTP The best I can explain: The Distributed Management Task Force MAINTAINS a Common Information MODEL (CIM) to represent a common set of network objects and their RELATIONSHIPS. CIM-XML/HTTP refers to the operations of CIM being performed over HTTP or XML. SMI-S USES CIM-XML/HTTP. |
|
| 28. |
Task of Distributed Management Task Force is not ________(a) to promote interoperability among the management solution providers(b) bto act as an interface between the various budding technologies and provide solution to manage various environments(c) to track the operation of the different management solution providers(d) to manage the facility by itself if one of the management solution providers failThis question was posed to me by my college professor while I was bunking the class.This intriguing question originated from SMI in division Application Layer of Computer Network |
|
Answer» Correct choice is (d) to manage the facility by itself if ONE of the MANAGEMENT solution providers fail |
|
| 29. |
Effect of open standards like SMI(s) is _______________(a) standardization drives software interoperability and interchange ability(b) breaks the old-style dependence on proprietary methods, trade secrets, and singleproviders(c) builds a strong foundation on which others can quickly build and innovate(d) all of the mentionedThe question was posed to me in exam.Question is taken from SMI topic in chapter Application Layer of Computer Network |
|
Answer» Right ANSWER is (d) all of the mentioned |
|
| 30. |
Among the following, identify which task is not involved in Storage Capacity management?(a) Identifying storage systems are approaching full capacity(b) Monitoring trends for each resource(c) Tracking Total capacity, total used, total available(d) Preventing unauthorized access to the storageThe question was asked by my school principal while I was bunking the class.I'm obligated to ask this question of SMI in chapter Application Layer of Computer Network |
|
Answer» RIGHT ANSWER is (d) Preventing unauthorized access to the storage Best EXPLANATION: Prevention of unauthorized access to storage is the task of Security management. IDENTIFYING when the storage is APPROACHING full capacity, monitoring trends, reporting and tracking capacity are the tasks of Storage Capacity management. |
|
| 31. |
Effective Storage management does not include __________(a) security(b) backups(c) reporting(d) connectionThis question was addressed to me during an internship interview.Question is from SMI topic in division Application Layer of Computer Network |
|
Answer» Correct choice is (d) connection |
|
| 32. |
How do Storage administrators ensure secure access to storage devices?(a) By using Zoning(b) By putting a physical lock on the storage device(c) By keeping devices shutdown when not in use(d) By keeping devices when usedThis question was addressed to me at a job interview.My enquiry is from SMI topic in division Application Layer of Computer Network |
|
Answer» RIGHT CHOICE is (a) By USING Zoning The best I can explain: Zoning is a METHOD in SAN that can be used by a storage administrator to specify who can see what in the SAN. Zoning might complicate the SCALING process if the size of the SAN increases. |
|
| 33. |
Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.(a) Proprietary management interfaces(b) Multiple applications to manage storage in the data center(c) No single view(d) Single viewThe question was posed to me in an interview.The question is from SMI in section Application Layer of Computer Network |
|
Answer» The correct choice is (d) Single VIEW |
|
| 34. |
Which protocols are used for Storage management?(a) SNMP(b) LDAP(c) POP3(d) MIBThis question was addressed to me in final exam.This key question is from SMI in portion Application Layer of Computer Network |
|
Answer» The correct choice is (a) SNMP |
|
| 35. |
Which of the following is not a storage device?(a) Switch(b) RAID Arrays(c) Tape drives(d) HubI had been asked this question during an interview for a job.I'd like to ask this question from SMI topic in chapter Application Layer of Computer Network |
|
Answer» Right CHOICE is (d) Hub |
|
| 36. |
Storage management comprises of _______________(a) SAN Management(b) Data protection(c) Disk operation(d) All of the mentionedI got this question during an interview.This interesting question is from SMI topic in chapter Application Layer of Computer Network |
|
Answer» The correct answer is (d) All of the mentioned |
|
| 37. |
Which layer of the OSI reference model does IPsec work at?(a) Layer 1(b) Layer 2(c) Layer 3(d) Layer 4I got this question during an interview for a job.My doubt stems from Virtual Private Networks in portion Application Layer of Computer Network |
|
Answer» The correct answer is (c) Layer 3 |
|
| 38. |
Which layer of the OSI reference model does PPTP work at?(a) Layer 1(b) Layer 2(c) Layer 3(d) Layer 4The question was asked in a job interview.This interesting question is from Virtual Private Networks topic in section Application Layer of Computer Network |
|
Answer» Correct option is (b) Layer 2 |
|
| 39. |
L2F was developed by which company?(a) Microsoft(b) Cisco(c) Blizzard Entertainment(d) IETFI got this question by my college professor while I was bunking the class.Origin of the question is Virtual Private Networks topic in division Application Layer of Computer Network |
|
Answer» CORRECT option is (b) Cisco Best explanation: L2F stands for LAYER 2 FORWARDING PROTOCOL. It was designed by Cisco to TUNNEL PPP traffic, helping create VPNs over the internet. |
|
| 40. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards?(a) IPsec(b) PPTP(c) PPP(d) L2TPI have been asked this question in an online quiz.The query is from Virtual Private Networks topic in portion Application Layer of Computer Network |
|
Answer» Correct answer is (a) IPSEC |
|
| 41. |
Which layer 3 protocols can be transmitted over an L2TP VPN?(a) Only IP(b) Only IPX(c) Only ICMP(d) IP and IPXI had been asked this question in class test.The above asked question is from Virtual Private Networks topic in section Application Layer of Computer Network |
|
Answer» The correct option is (d) IP and IPX |
|
| 42. |
VPNs are financially speaking __________(a) Always more expensive than leased lines(b) Always cheaper than leased lines(c) Usually cheaper than leased lines(d) Usually more expensive than leased linesThis question was posed to me in an international level competition.Asked question is from Virtual Private Networks topic in division Application Layer of Computer Network |
|
Answer» The correct answer is (c) Usually cheaper than leased lines |
|
| 43. |
Traffic in a VPN is NOT ____________(a) Invisible from public networks(b) Logically separated from other traffic(c) Accessible from unauthorized public networks(d) Restricted to a single protocol in IPsecThe question was asked in unit test.Query is from Virtual Private Networks topic in portion Application Layer of Computer Network |
|
Answer» Correct option is (c) ACCESSIBLE from UNAUTHORIZED public networks |
|
| 44. |
Which of the following statements is NOT true concerning VPNs?(a) Financially rewarding compared to leased lines(b) Allows remote workers to access corporate data(c) Allows LAN-to-LAN connectivity over public networks(d) Is the backbone of the InternetThis question was addressed to me in an interview for job.I'm obligated to ask this question of Virtual Private Networks topic in section Application Layer of Computer Network |
|
Answer» The correct option is (d) Is the backbone of the INTERNET |
|
| 45. |
What protocol is NOT used in the operation of a VPN?(a) PPTP(b) IPsec(c) YMUM(d) L2TPThis question was posed to me in quiz.My query is from Virtual Private Networks in portion Application Layer of Computer Network |
|
Answer» The correct answer is (C) YMUM |
|
| 46. |
When were VPNs introduced into the commercial world?(a) Early 80’s(b) Late 80’s(c) Early 90’s(d) Late 90’sThis question was posed to me by my college professor while I was bunking the class.This intriguing question comes from Virtual Private Networks topic in division Application Layer of Computer Network |
|
Answer» The correct answer is (d) Late 90’s |
|
| 47. |
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.(a) VNP(b) VPN(c) VSN(d) VSPNI had been asked this question during an online exam.The query is from Virtual Private Networks in division Application Layer of Computer Network |
|
Answer» The correct CHOICE is (b) VPN |
|
| 48. |
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________(a) DNS lookup(b) DNS hijacking(c) DNS spoofing(d) DNS authorizingThis question was addressed to me in exam.The question is from IPSecurity in section Application Layer of Computer Network |
|
Answer» The correct CHOICE is (c) DNS spoofing |
|
| 49. |
PGP encrypts data by using a block cipher called ______(a) International data encryption algorithm(b) Private data encryption algorithm(c) Internet data encryption algorithm(d) Local data encryption algorithmThe question was asked in homework.Asked question is from IPSecurity topic in section Application Layer of Computer Network |
|
Answer» Right answer is (a) INTERNATIONAL data encryption algorithm |
|
| 50. |
Pretty good privacy (PGP) is used in ______(a) Browser security(b) Email security(c) FTP security(d) WiFi securityThe question was posed to me in an interview for job.My enquiry is from IPSecurity topic in division Application Layer of Computer Network |
|
Answer» Correct choice is (b) Email SECURITY |
|