InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Extensible authentication protocol is authentication framework frequently used in ______(a) Wired personal area network(b) Wireless networks(c) Wired local area network(d) Wired metropolitan area networkI have been asked this question during an interview for a job.This interesting question is from IPSecurity topic in section Application Layer of Computer Network |
|
Answer» Right OPTION is (B) Wireless networks |
|
| 52. |
An attempt to make a computer resource unavailable to its intended users is called ______(a) Denial-of-service attack(b) Virus attack(c) Worms attack(d) Botnet processThis question was addressed to me during an online exam.Asked question is from IPSecurity topic in division Application Layer of Computer Network |
|
Answer» Right answer is (a) Denial-of-SERVICE attack |
|
| 53. |
WPA2 is used for security in _______(a) Ethernet(b) Bluetooth(c) Wi-Fi(d) EmailI have been asked this question in an internship interview.This is a very interesting question from IPSecurity in section Application Layer of Computer Network |
|
Answer» RIGHT choice is (c) Wi-Fi To explain: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and FIRMS with STRONG data security and protection for their WIRELESS networks (WiFi) to give them confidence that only AUTHORIZED users can access their network. |
|
| 54. |
Which component is included in IP security?(a) Authentication Header (AH)(b) Encapsulating Security Payload (ESP)(c) Internet key Exchange (IKE)(d) All of the mentionedI got this question in semester exam.The query is from IPSecurity in division Application Layer of Computer Network |
|
Answer» The correct choice is (d) All of the mentioned |
|
| 55. |
In tunnel mode, IPSec protects the ______(a) Entire IP packet(b) IP header(c) IP payload(d) IP trailerThe question was posed to me in unit test.My doubt stems from IPSecurity topic in section Application Layer of Computer Network |
|
Answer» Right CHOICE is (a) Entire IP packet |
|
| 56. |
IPSec is designed to provide security at the _________(a) Transport layer(b) Network layer(c) Application layer(d) Session layerThis question was posed to me in my homework.I would like to ask this question from IPSecurity in portion Application Layer of Computer Network |
|
Answer» Right option is (b) Network layer |
|
| 57. |
If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.(a) MAC address(b) IP address(c) Both MAC address and IP address(d) None of the mentionedThis question was addressed to me in an interview.This is a very interesting question from DHCP in portion Application Layer of Computer Network |
|
Answer» The correct answer is (c) Both MAC address and IP address |
|
| 58. |
What is DHCP snooping?(a) techniques applied to ensure the security of an existing DHCP infrastructure(b) encryption of the DHCP server requests(c) algorithm for DHCP(d) none of the mentionedI got this question in semester exam.I would like to ask this question from DHCP topic in division Application Layer of Computer Network |
|
Answer» The CORRECT option is (a) techniques applied to ensure the SECURITY of an existing DHCP infrastructure |
|
| 59. |
After obtaining the IP address, to prevent the IP conflict the client may use _________(a) internet relay chat(b) broader gateway protocol(c) address resolution protocol(d) none of the mentionedI have been asked this question during an interview.I need to ask this question from DHCP topic in division Application Layer of Computer Network |
|
Answer» The correct answer is (c) address RESOLUTION protocol |
|
| 60. |
DHCP client and servers on the same subnet communicate via _________(a) UDP broadcast(b) UDP unicast(c) TCP broadcast(d) TCP unicastThis question was addressed to me during an internship interview.I want to ask this question from DHCP topic in chapter Application Layer of Computer Network |
|
Answer» The CORRECT choice is (a) UDP broadcast |
|
| 61. |
The DHCP server can provide the _______ of the IP addresses.(a) dynamic allocation(b) automatic allocation(c) static allocation(d) all of the mentionedThis question was addressed to me during an interview.This interesting question is from DHCP topic in chapter Application Layer of Computer Network |
|
Answer» CORRECT answer is (d) all of the mentioned To EXPLAIN: When a host acquires MULTIPLE offers of IP addresses from different DHCP servers, the host will broadcast a dhcp request identifying the server whose offer has been ACCEPTED. |
|
| 62. |
DHCP uses UDP port _________ for sending data to the server.(a) 66(b) 67(c) 68(d) 69I had been asked this question by my school teacher while I was bunking the class.My doubt is from DHCP topic in section Application Layer of Computer Network |
|
Answer» The CORRECT choice is (b) 67 |
|
| 63. |
IP assigned for a client by DHCP server is(a) for a limited period(b) for an unlimited period(c) not time dependent(d) none of the mentionedThe question was posed to me in an international level competition.My doubt stems from DHCP topic in section Application Layer of Computer Network |
|
Answer» The CORRECT option is (a) for a LIMITED PERIOD |
|
| 64. |
The DHCP server _________(a) maintains a database of available IP addresses(b) maintains the information about client configuration parameters(c) grants a IP address when receives a request from a client(d) all of the mentionedI had been asked this question during an internship interview.This is a very interesting question from DHCP topic in portion Application Layer of Computer Network |
|
Answer» CORRECT choice is (d) all of the mentioned The best explanation: Whenever a DHCP server GETS a request from a client it responds with a DHCP offer containing IP address being OFFERED, network MASK offered, the amount of time that the client can USE and keep it, the ip address of the DHCP server making this offer. |
|
| 65. |
DHCP is used for ________(a) IPv6(b) IPv4(c) Both IPv6 and IPv4(d) None of the mentionedThis question was posed to me by my college director while I was bunking the class.My doubt is from DHCP in division Application Layer of Computer Network |
|
Answer» CORRECT answer is (C) Both IPV6 and IPv4 To explain I would say: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts KNOW about the change dynamically, and hosts update their INFO themselves. |
|
| 66. |
DHCP (dynamic host configuration protocol) provides __________ to the client.(a) IP address(b) MAC address(c) Url(d) None of the mentionedThe question was posed to me by my school principal while I was bunking the class.I want to ask this question from DHCP in division Application Layer of Computer Network |
|
Answer» CORRECT option is (a) IP address Explanation: We use DHCP to ALLOW the hosts to ACQUIRE their ip ADDRESSES dynamically which is better than visiting each and every host on the network and configure all of this information manually. |
|
| 67. |
Which one of the following authentication method is used by SSH?(a) public-key(b) host based(c) password(d) all of the mentionedI got this question by my college professor while I was bunking the class.The question is from SSH topic in section Application Layer of Computer Network |
|
Answer» Right choice is (d) all of the mentioned |
|
| 68. |
SCP protocol is evolved from __________ over SSH.(a) RCP protocol(b) DHCP protocol(c) MGCP protocol(d) GCP protocolI had been asked this question at a job interview.This intriguing question comes from SSH in portion Application Layer of Computer Network |
|
Answer» The correct CHOICE is (a) RCP protocol |
|
| 69. |
Which one of the following feature was present in SSH protocol, version 1?(a) password changing(b) periodic replacement of session keys(c) support for public-key certificates(d) none of the mentionedI have been asked this question in an interview for internship.Origin of the question is SSH topic in portion Application Layer of Computer Network |
|
Answer» RIGHT answer is (d) none of the MENTIONED Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide STRONG authentication and GUARANTEE confidentiality. |
|
| 70. |
SSH-2 does not contain ______________(a) transport layer(b) user authentication layer(c) physical layer(d) connection layerThis question was posed to me in unit test.I want to ask this question from SSH topic in portion Application Layer of Computer Network |
|
Answer» The correct CHOICE is (c) physical layer |
|
| 71. |
Which one of the following is a file transfer protocol using SSH?(a) SCP(b) SFTP(c) Rsync(d) All of the mentionedI have been asked this question in semester exam.My enquiry is from SSH topic in section Application Layer of Computer Network |
|
Answer» Correct CHOICE is (d) All of the mentioned |
|
| 72. |
Which one of the following protocol can be used for login to a shell on a remote host except SSH?(a) telnet(b) rlogin(c) both telnet and rlogin(d) none of the mentionedThe question was asked in a job interview.This is a very interesting question from SSH in division Application Layer of Computer Network |
|
Answer» The CORRECT answer is (c) both TELNET and rlogin |
|
| 73. |
Which standard TCP port is assigned for contacting SSH servers?(a) port 21(b) port 22(c) port 23(d) port 24I had been asked this question by my school principal while I was bunking the class.Enquiry is from SSH topic in chapter Application Layer of Computer Network |
|
Answer» Correct answer is (B) port 22 |
|
| 74. |
SSH uses ___________ to authenticate the remote computer.(a) public-key cryptography(b) private-key cryptography(c) any of public-key or private-key(d) both public-key & private-keyThe question was asked in an online interview.I would like to ask this question from SSH in chapter Application Layer of Computer Network |
|
Answer» The correct answer is (a) public-key cryptography |
|
| 75. |
SSH can be used in only _____________(a) unix-like operating systems(b) windows(c) both unix-like and windows systems(d) none of the mentionedThe question was posed to me in class test.My doubt is from SSH in portion Application Layer of Computer Network |
|
Answer» The CORRECT choice is (c) both unix-like and WINDOWS systems |
|
| 76. |
Secure shell (SSH) network protocol is used for __________(a) secure data communication(b) remote command-line login(c) remote command execution(d) all of the mentionedThis question was addressed to me during a job interview.This intriguing question comes from SSH in chapter Application Layer of Computer Network |
|
Answer» The correct CHOICE is (d) all of the mentioned |
|
| 77. |
Which one of the following is not true?(a) multiple hostnames may correspond to a single IP address(b) a single hostname may correspond to many IP addresses(c) a single hostname may correspond to a single IP address(d) none of the mentionedI have been asked this question in exam.My doubt is from DNS topic in portion Application Layer of Computer Network |
|
Answer» The correct option is (c) a SINGLE hostname may CORRESPOND to a single IP ADDRESS |
|
| 78. |
The domain name system is maintained by _______(a) distributed database system(b) a single server(c) a single computer(d) none of the mentionedI got this question in examination.This question is from DNS in chapter Application Layer of Computer Network |
|
Answer» Right ANSWER is (a) distributed database SYSTEM |
|
| 79. |
The right to use a domain name is delegated by domain name registers which are accredited by _______(a) internet architecture board(b) internet society(c) internet research task force(d) internet corporation for assigned names and numbersI have been asked this question during an online interview.Query is from DNS in division Application Layer of Computer Network |
|
Answer» Correct answer is (d) internet corporation for assigned names and numbers |
|
| 80. |
Wildcard domain names start with label _______(a) @(b) *(c) &(d) #I got this question during an online interview.I would like to ask this question from DNS in portion Application Layer of Computer Network |
|
Answer» Correct OPTION is (b) * |
|
| 81. |
Which one of the following allows client to update their DNS entry as their IP address change?(a) dynamic DNS(b) mail transfer agent(c) authoritative name server(d) none of the mentionedI got this question during an internship interview.This key question is from DNS in division Application Layer of Computer Network |
|
Answer» Right choice is (a) dynamic DNS |
|
| 82. |
If a server has no clue about where to find the address for a hostname then _______(a) server asks to the root server(b) server asks to its adjcent server(c) request is not processed(d) none of the mentionedI had been asked this question during an online interview.My query is from DNS topic in chapter Application Layer of Computer Network |
|
Answer» Correct OPTION is (a) server asks to the ROOT server |
|
| 83. |
DNS database contains _______(a) name server records(b) hostname-to-address records(c) hostname aliases(d) all of the mentionedThe question was asked during an online exam.The above asked question is from DNS topic in chapter Application Layer of Computer Network |
|
Answer» CORRECT option is (d) all of the mentioned The explanation is: Domain Name system not only deals with MAPPING IP addresses with the HOSTNAME but ALSO deals with exchange of information in the server. |
|
| 84. |
Servers handle requests for other domains _______(a) directly(b) by contacting remote DNS server(c) it is not possible(d) none of the mentionedI have been asked this question in a job interview.My question is taken from DNS in chapter Application Layer of Computer Network |
|
Answer» The correct ANSWER is (b) by contacting remote DNS server |
|
| 85. |
A DNS client is called _________(a) DNS updater(b) DNS resolver(c) DNS handler(d) none of the mentionedI have been asked this question in a job interview.I'm obligated to ask this question of DNS topic in section Application Layer of Computer Network |
|
Answer» The CORRECT option is (b) DNS resolver |
|
| 86. |
The entire hostname has a maximum of ___________(a) 255 characters(b) 127 characters(c) 63 characters(d) 31 charactersThis question was posed to me in semester exam.This is a very interesting question from DNS in section Application Layer of Computer Network |
|
Answer» RIGHT ANSWER is (a) 255 CHARACTERS Easy EXPLANATION: An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to 63 characters long. HOST name is actually a label that is given to a device in a network. |
|
| 87. |
SMTP is not used to deliver messages to ______(a) user’s terminal(b) user’s mailbox(c) user’s word processor(d) user’s email clientI have been asked this question in a job interview.The query is from SMTP topic in portion Application Layer of Computer Network |
|
Answer» Right CHOICE is (c) user’s word PROCESSOR |
|
| 88. |
Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?(a) open mail relay(b) wide mail reception(c) open mail reception(d) short mail receptionI had been asked this question during an interview.This is a very interesting question from SMTP topic in division Application Layer of Computer Network |
|
Answer» Correct answer is (a) open mail relay |
|
| 89. |
SMTP defines _______(a) message transport(b) message encryption(c) message content(d) message passwordI got this question in homework.Enquiry is from SMTP in chapter Application Layer of Computer Network |
|
Answer» Correct OPTION is (a) message transport |
|
| 90. |
An SMTP session may not include _______(a) zero SMTP transaction(b) one SMTP transaction(c) more than one SMTP transaction(d) one HTTP transactionThis question was posed to me in an interview for job.Question is from SMTP topic in chapter Application Layer of Computer Network |
|
Answer» RIGHT answer is (d) one HTTP transaction To explain I would say: An SMTP session can only include SMTP transactions regardless the number. Any other protocol’s transaction is not INCLUDED in an SMTP session. |
|
| 91. |
An email client needs to know the _________ of its initial SMTP server.(a) IP address(b) MAC address(c) URL(d) NameI got this question during an online exam.My enquiry is from SMTP in division Application Layer of Computer Network |
|
Answer» Correct choice is (a) IP address |
|
| 92. |
What is on-demand mail relay (ODMR)?(a) protocol for SMTP security(b) an SMTP extension(c) protocol for web pages(d) protocol for faster mail transferI have been asked this question in quiz.This is a very interesting question from SMTP topic in section Application Layer of Computer Network |
|
Answer» The correct CHOICE is (b) an SMTP extension |
|
| 93. |
Which one of the following protocol is used to receive mail messages?(a) SMTP(b) Post Office Protocol (POP)(c) Internet Message Access Protocol (IMAP)(d) FTPI had been asked this question during a job interview.My doubt stems from SMTP topic in section Application Layer of Computer Network |
|
Answer» RIGHT option is (d) FTP To EXPLAIN: FTP is used to SHARE files. SMTP, POP and IMAP are the PROTOCOLS used to send and receive mails on the internet. |
|
| 94. |
SMTP uses which of the following TCP port?(a) 22(b) 23(c) 21(d) 25I got this question during an online exam.Question is from SMTP topic in chapter Application Layer of Computer Network |
|
Answer» Correct option is (d) 25 |
|
| 95. |
SMTP connections secured by SSL are known as _____________(a) SMTPS(b) SSMTP(c) SNMP(d) STARTTLSI have been asked this question in an online interview.This key question is from SMTP in section Application Layer of Computer Network |
|
Answer» Correct option is (a) SMTPS |
|
| 96. |
Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.(a) TCP(b) UDP(c) DCCP(d) SCTPI have been asked this question during an interview.This key question is from SMTP in division Application Layer of Computer Network |
|
Answer» The correct choice is (a) TCP |
|
| 97. |
User agent does not support this ___________(a) Composing messages(b) Reading messages(c) Replying messages(d) Routing messagesThe question was asked during a job interview.This interesting question is from SMTP in section Application Layer of Computer Network |
|
Answer» CORRECT choice is (d) Routing messages To EXPLAIN: The user AGENT is basically a software program that allows the user to send, and receive e-mail messages. Routing of the MESSAGE is done by the Message Transfer Agent. |
|
| 98. |
When the sender and the receiver of an email are on different systems, we need only _________(a) One MTA(b) Two UAs(c) Two UAs and one MTA(d) Two UAs and two MTAsThe question was asked during an interview.My doubt is from SMTP topic in chapter Application Layer of Computer Network |
|
Answer» The correct option is (d) TWO UAs and two MTAs |
|
| 99. |
Which of the following is an example of user agents for e-mail?(a) Microsoft Outlook(b) Facebook(c) Google(d) TumblrThis question was posed to me in an interview.My question is from SMTP in division Application Layer of Computer Network |
|
Answer» Correct option is (a) Microsoft Outlook |
|
| 100. |
A session may include ________(a) Zero or more SMTP transactions(b) Exactly one SMTP transactions(c) Always more than one SMTP transactions(d) Number of SMTP transactions cant be determinedThe question was asked in quiz.The origin of the question is SMTP in division Application Layer of Computer Network |
|
Answer» Correct option is (a) Zero or more SMTP TRANSACTIONS |
|