Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

Extensible authentication protocol is authentication framework frequently used in ______(a) Wired personal area network(b) Wireless networks(c) Wired local area network(d) Wired metropolitan area networkI have been asked this question during an interview for a job.This interesting question is from IPSecurity topic in section Application Layer of Computer Network

Answer»

Right OPTION is (B) Wireless networks

The best explanation: The EXTENSIBLE Authentication Protocol (EAP) is an authentication protocol USED to connect a network node to the Internet. It designed through extending the METHODS used by the Point-to-Point Protocol for authentication.

52.

An attempt to make a computer resource unavailable to its intended users is called ______(a) Denial-of-service attack(b) Virus attack(c) Worms attack(d) Botnet processThis question was addressed to me during an online exam.Asked question is from IPSecurity topic in division Application Layer of Computer Network

Answer»

Right answer is (a) Denial-of-SERVICE attack

To explain I WOULD say: In a Denial of Service attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. The methods that the attacker can USE are VULNERABILITY attack, bandwidth flooding and CONNECTION flooding.

53.

WPA2 is used for security in _______(a) Ethernet(b) Bluetooth(c) Wi-Fi(d) EmailI have been asked this question in an internship interview.This is a very interesting question from IPSecurity in section Application Layer of Computer Network

Answer» RIGHT choice is (c) Wi-Fi

To explain: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and FIRMS with STRONG data security and protection for their WIRELESS networks (WiFi) to give them confidence that only AUTHORIZED users can access their network.
54.

Which component is included in IP security?(a) Authentication Header (AH)(b) Encapsulating Security Payload (ESP)(c) Internet key Exchange (IKE)(d) All of the mentionedI got this question in semester exam.The query is from IPSecurity in division Application Layer of Computer Network

Answer»

The correct choice is (d) All of the mentioned

For explanation I would SAY: AH ensures that there is no retransmission of DATA from an unauthorized source, and protects against data TAMPERING. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. IKE is used to make sure that only the intended sender and receiver can ACCESS the message.

55.

In tunnel mode, IPSec protects the ______(a) Entire IP packet(b) IP header(c) IP payload(d) IP trailerThe question was posed to me in unit test.My doubt stems from IPSecurity topic in section Application Layer of Computer Network

Answer»

Right CHOICE is (a) Entire IP packet

Explanation: In the tunnel mode, IPSec adds control bits into the packets to ENCRYPT the entire packet between the IPSec endpoints. Using encryption, it PROVIDES secure communication between the two endpoints.

56.

IPSec is designed to provide security at the _________(a) Transport layer(b) Network layer(c) Application layer(d) Session layerThis question was posed to me in my homework.I would like to ask this question from IPSecurity in portion Application Layer of Computer Network

Answer»

Right option is (b) Network layer

Easy explanation: IPSec is a set of protocols used to PROVIDE authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP MODEL, it provides SECURITY at the IP layer i.e. the network layer.

57.

If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.(a) MAC address(b) IP address(c) Both MAC address and IP address(d) None of the mentionedThis question was addressed to me in an interview.This is a very interesting question from DHCP in portion Application Layer of Computer Network

Answer»

The correct answer is (c) Both MAC address and IP address

The BEST EXPLANATION: The DHCP snooping is done to PREVENT unauthorized IP addresses being offered by unauthorized SERVERS. This features allows only SPECIFIC mac addresses and IP addresses to access the network.

58.

What is DHCP snooping?(a) techniques applied to ensure the security of an existing DHCP infrastructure(b) encryption of the DHCP server requests(c) algorithm for DHCP(d) none of the mentionedI got this question in semester exam.I would like to ask this question from DHCP topic in division Application Layer of Computer Network

Answer»

The CORRECT option is (a) techniques applied to ensure the SECURITY of an existing DHCP infrastructure

For explanation I WOULD say: DHCP snooping is a security feature that is used in OS of a NETWORK in the layer 2. This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.

59.

After obtaining the IP address, to prevent the IP conflict the client may use _________(a) internet relay chat(b) broader gateway protocol(c) address resolution protocol(d) none of the mentionedI have been asked this question during an interview.I need to ask this question from DHCP topic in division Application Layer of Computer Network

Answer»

The correct answer is (c) address RESOLUTION protocol

Easiest explanation: ARP abbreviation for address resolution protocol is used for mapping IP addresses to MAC addresses that are present in the local network.

60.

DHCP client and servers on the same subnet communicate via _________(a) UDP broadcast(b) UDP unicast(c) TCP broadcast(d) TCP unicastThis question was addressed to me during an internship interview.I want to ask this question from DHCP topic in chapter Application Layer of Computer Network

Answer»

The CORRECT choice is (a) UDP broadcast

To explain I would say: DHCP actually EMPLOYS a CONNECTIONLESS service, which is PROVIDED by UDP, since TCP is connection oriented. It is implemented with two UDP port numbers 67 and 68 for its operations.

61.

The DHCP server can provide the _______ of the IP addresses.(a) dynamic allocation(b) automatic allocation(c) static allocation(d) all of the mentionedThis question was addressed to me during an interview.This interesting question is from DHCP topic in chapter Application Layer of Computer Network

Answer» CORRECT answer is (d) all of the mentioned

To EXPLAIN: When a host acquires MULTIPLE offers of IP addresses from different DHCP servers, the host will broadcast a dhcp request identifying the server whose offer has been ACCEPTED.
62.

DHCP uses UDP port _________ for sending data to the server.(a) 66(b) 67(c) 68(d) 69I had been asked this question by my school teacher while I was bunking the class.My doubt is from DHCP topic in section Application Layer of Computer Network

Answer»

The CORRECT choice is (b) 67

For EXPLANATION I would say: 67 is the UDP port NUMBER that is USED as the destination port of a server. Whereas UDP port number 68 is used by the client.

63.

IP assigned for a client by DHCP server is(a) for a limited period(b) for an unlimited period(c) not time dependent(d) none of the mentionedThe question was posed to me in an international level competition.My doubt stems from DHCP topic in section Application Layer of Computer Network

Answer»

The CORRECT option is (a) for a LIMITED PERIOD

To elaborate: The IP address offered to a client is only for a limited period of time. There is actually a certain amount of time that the client can use and KEEP this IP address.

64.

The DHCP server _________(a) maintains a database of available IP addresses(b) maintains the information about client configuration parameters(c) grants a IP address when receives a request from a client(d) all of the mentionedI had been asked this question during an internship interview.This is a very interesting question from DHCP topic in portion Application Layer of Computer Network

Answer» CORRECT choice is (d) all of the mentioned

The best explanation: Whenever a DHCP server GETS a request from a client it responds with a DHCP offer containing IP address being OFFERED, network MASK offered, the amount of time that the client can USE and keep it, the ip address of the DHCP server making this offer.
65.

DHCP is used for ________(a) IPv6(b) IPv4(c) Both IPv6 and IPv4(d) None of the mentionedThis question was posed to me by my college director while I was bunking the class.My doubt is from DHCP in division Application Layer of Computer Network

Answer» CORRECT answer is (C) Both IPV6 and IPv4

To explain I would say: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts KNOW about the change dynamically, and hosts update their INFO themselves.
66.

DHCP (dynamic host configuration protocol) provides __________ to the client.(a) IP address(b) MAC address(c) Url(d) None of the mentionedThe question was posed to me by my school principal while I was bunking the class.I want to ask this question from DHCP in division Application Layer of Computer Network

Answer» CORRECT option is (a) IP address

Explanation: We use DHCP to ALLOW the hosts to ACQUIRE their ip ADDRESSES dynamically which is better than visiting each and every host on the network and configure all of this information manually.
67.

Which one of the following authentication method is used by SSH?(a) public-key(b) host based(c) password(d) all of the mentionedI got this question by my college professor while I was bunking the class.The question is from SSH topic in section Application Layer of Computer Network

Answer»

Right choice is (d) all of the mentioned

For explanation: SSH USED public key AUTHENTICATION, PASSWORD authentication, Host BASED authentication, keyboard authentication and authentication of servers.

68.

SCP protocol is evolved from __________ over SSH.(a) RCP protocol(b) DHCP protocol(c) MGCP protocol(d) GCP protocolI had been asked this question at a job interview.This intriguing question comes from SSH in portion Application Layer of Computer Network

Answer»

The correct CHOICE is (a) RCP protocol

To explain: RCP is the abbreviation for Rate Control Protocol is a congestion control ALGORITHM for FAST USER RESPONSE times.

69.

Which one of the following feature was present in SSH protocol, version 1?(a) password changing(b) periodic replacement of session keys(c) support for public-key certificates(d) none of the mentionedI have been asked this question in an interview for internship.Origin of the question is SSH topic in portion Application Layer of Computer Network

Answer» RIGHT answer is (d) none of the MENTIONED

Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide STRONG authentication and GUARANTEE confidentiality.
70.

SSH-2 does not contain ______________(a) transport layer(b) user authentication layer(c) physical layer(d) connection layerThis question was posed to me in unit test.I want to ask this question from SSH topic in portion Application Layer of Computer Network

Answer»

The correct CHOICE is (c) physical layer

The best I can EXPLAIN: SSH2 is a more secure, portable and EFFICIENT version of SSH that INCLUDES SFTP, which is functionally similar to FTP, but is SSH2 ENCRYPTED.

71.

Which one of the following is a file transfer protocol using SSH?(a) SCP(b) SFTP(c) Rsync(d) All of the mentionedI have been asked this question in semester exam.My enquiry is from SSH topic in section Application Layer of Computer Network

Answer»

Correct CHOICE is (d) All of the mentioned

The best EXPLANATION: SCP (Secure copy protocol), SFTP (SSH FILE Transfer Protocol) and Rsync all are file transfer protocols which are USED by SSH.

72.

Which one of the following protocol can be used for login to a shell on a remote host except SSH?(a) telnet(b) rlogin(c) both telnet and rlogin(d) none of the mentionedThe question was asked in a job interview.This is a very interesting question from SSH in division Application Layer of Computer Network

Answer»

The CORRECT answer is (c) both TELNET and rlogin

Easy EXPLANATION: SSH is more SECURED then telnet and rlogin.

73.

Which standard TCP port is assigned for contacting SSH servers?(a) port 21(b) port 22(c) port 23(d) port 24I had been asked this question by my school principal while I was bunking the class.Enquiry is from SSH topic in chapter Application Layer of Computer Network

Answer»

Correct answer is (B) port 22

The BEST I can explain: Port 22 is USED for contacting ssh SERVERS, used for file transfers (SCP, sftp) and also port forwarding.

74.

SSH uses ___________ to authenticate the remote computer.(a) public-key cryptography(b) private-key cryptography(c) any of public-key or private-key(d) both public-key & private-keyThe question was asked in an online interview.I would like to ask this question from SSH in chapter Application Layer of Computer Network

Answer»

The correct answer is (a) public-key cryptography

For explanation I WOULD say: Public ENCRYPTION key is SLOWER but more flexible. Every cryptographic security SYSTEM requires a private key for private access and a public key for location.

75.

SSH can be used in only _____________(a) unix-like operating systems(b) windows(c) both unix-like and windows systems(d) none of the mentionedThe question was posed to me in class test.My doubt is from SSH in portion Application Layer of Computer Network

Answer»

The CORRECT choice is (c) both unix-like and WINDOWS systems

To explain: SSH isn’t confined to a certain NETWORK or operating system. It can be implemented over DIFFERENT networks and on different operating systems.

76.

Secure shell (SSH) network protocol is used for __________(a) secure data communication(b) remote command-line login(c) remote command execution(d) all of the mentionedThis question was addressed to me during a job interview.This intriguing question comes from SSH in chapter Application Layer of Computer Network

Answer»

The correct CHOICE is (d) all of the mentioned

Easy explanation: SSH PROVIDES high encryption and security FEATURES while COMMUNICATING through a network. It is a cryptographic network protocol.

77.

Which one of the following is not true?(a) multiple hostnames may correspond to a single IP address(b) a single hostname may correspond to many IP addresses(c) a single hostname may correspond to a single IP address(d) none of the mentionedI have been asked this question in exam.My doubt is from DNS topic in portion Application Layer of Computer Network

Answer»

The correct option is (c) a SINGLE hostname may CORRESPOND to a single IP ADDRESS

To elaborate: It NEED not be that a single hostname will correspond to a ip address. For example facebook.com and fb.com both correspond to same ip address. So there can be multiple hostnames for a single ip address.

78.

The domain name system is maintained by _______(a) distributed database system(b) a single server(c) a single computer(d) none of the mentionedI got this question in examination.This question is from DNS in chapter Application Layer of Computer Network

Answer»

Right ANSWER is (a) distributed database SYSTEM

Explanation: A DOMAIN name system is MAINTAINED by a distributed database system. It is a collection of multiple, logically interrelated databases distributed over a computer network.

79.

The right to use a domain name is delegated by domain name registers which are accredited by _______(a) internet architecture board(b) internet society(c) internet research task force(d) internet corporation for assigned names and numbersI have been asked this question during an online interview.Query is from DNS in division Application Layer of Computer Network

Answer»

Correct answer is (d) internet corporation for assigned names and numbers

Easy EXPLANATION: The ICANN (Internet Corporation for Assigned Names and Numbers) DEALS with IP address space allocation, protocol identifier assignment, generic and country code Top Level DOMAIN NAME system management (gTLD and ccTLD).

80.

Wildcard domain names start with label _______(a) @(b) *(c) &(d) #I got this question during an online interview.I would like to ask this question from DNS in portion Application Layer of Computer Network

Answer»

Correct OPTION is (b) *

Easiest explanation: A wildcard DNS record MATCHES REQUESTS to a non EXISTENT domain name. This wildcard DNS record is specified by using asterisk “*” as the starting of a domain name.

81.

Which one of the following allows client to update their DNS entry as their IP address change?(a) dynamic DNS(b) mail transfer agent(c) authoritative name server(d) none of the mentionedI got this question during an internship interview.This key question is from DNS in division Application Layer of Computer Network

Answer»

Right choice is (a) dynamic DNS

For EXPLANATION: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a NAME SERVER in the DNS. This does not require manual EDITING.

82.

If a server has no clue about where to find the address for a hostname then _______(a) server asks to the root server(b) server asks to its adjcent server(c) request is not processed(d) none of the mentionedI had been asked this question during an online interview.My query is from DNS topic in chapter Application Layer of Computer Network

Answer»

Correct OPTION is (a) server asks to the ROOT server

Easy explanation: Root name servers are ACTUALLY very important and critical as they are the FIRST STEP in translating human readable hostnames into IP addresses for carrying out communication.

83.

DNS database contains _______(a) name server records(b) hostname-to-address records(c) hostname aliases(d) all of the mentionedThe question was asked during an online exam.The above asked question is from DNS topic in chapter Application Layer of Computer Network

Answer» CORRECT option is (d) all of the mentioned

The explanation is: Domain Name system not only deals with MAPPING IP addresses with the HOSTNAME but ALSO deals with exchange of information in the server.
84.

Servers handle requests for other domains _______(a) directly(b) by contacting remote DNS server(c) it is not possible(d) none of the mentionedI have been asked this question in a job interview.My question is taken from DNS in chapter Application Layer of Computer Network

Answer»

The correct ANSWER is (b) by contacting remote DNS server

The best I can explain: Whenever a REQUEST is RECEIVED at server from other DOMAINS, it HANDLES this situation by contacting remote DNS server.

85.

A DNS client is called _________(a) DNS updater(b) DNS resolver(c) DNS handler(d) none of the mentionedI have been asked this question in a job interview.I'm obligated to ask this question of DNS topic in section Application Layer of Computer Network

Answer»

The CORRECT option is (b) DNS resolver

Easiest explanation: DNS client also KNOWN as DNS resolver also known as DNS LOOKUP helps to RESOLVE DNS requests using an external DNS server.

86.

The entire hostname has a maximum of ___________(a) 255 characters(b) 127 characters(c) 63 characters(d) 31 charactersThis question was posed to me in semester exam.This is a very interesting question from DNS in section Application Layer of Computer Network

Answer» RIGHT ANSWER is (a) 255 CHARACTERS

Easy EXPLANATION: An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to 63 characters long. HOST name is actually a label that is given to a device in a network.
87.

SMTP is not used to deliver messages to ______(a) user’s terminal(b) user’s mailbox(c) user’s word processor(d) user’s email clientI have been asked this question in a job interview.The query is from SMTP topic in portion Application Layer of Computer Network

Answer»

Right CHOICE is (c) user’s word PROCESSOR

Easy EXPLANATION: SMTP can only be used to send messages to user’s terminal, email CLIENT or mailbox. A stand-alone word processor cannot be connected to a network, so it won’t be possible to DELIVER messages to it.

88.

Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?(a) open mail relay(b) wide mail reception(c) open mail reception(d) short mail receptionI had been asked this question during an interview.This is a very interesting question from SMTP topic in division Application Layer of Computer Network

Answer»

Correct answer is (a) open mail relay

For EXPLANATION I WOULD say: Anyone can send an e-mail through an Open Mail Relay server so it acted like a free relay for email agents to forward their mails through. Open Mail RELAYS are now unpopular because they can be USED by attackers to perform man-in-the-middle attacks.

89.

SMTP defines _______(a) message transport(b) message encryption(c) message content(d) message passwordI got this question in homework.Enquiry is from SMTP in chapter Application Layer of Computer Network

Answer»

Correct OPTION is (a) message transport

Explanation: As the NAME suggests, Simple Mail Transfer Protocol is only responsible for “how” the message is TRANSFERRED i.e. Transport of the message. Other protocols such as TCP are used to provide other SERVICES like encryption for the messages.

90.

An SMTP session may not include _______(a) zero SMTP transaction(b) one SMTP transaction(c) more than one SMTP transaction(d) one HTTP transactionThis question was posed to me in an interview for job.Question is from SMTP topic in chapter Application Layer of Computer Network

Answer» RIGHT answer is (d) one HTTP transaction

To explain I would say: An SMTP session can only include SMTP transactions regardless the number. Any other protocol’s transaction is not INCLUDED in an SMTP session.
91.

An email client needs to know the _________ of its initial SMTP server.(a) IP address(b) MAC address(c) URL(d) NameI got this question during an online exam.My enquiry is from SMTP in division Application Layer of Computer Network

Answer»

Correct choice is (a) IP address

For EXPLANATION I would say: The client needs to know the IP of its INITIAL SMTP SERVER as it has to send the mail first to that server and then the server forwards the mail ahead on behalf of the USER.

92.

What is on-demand mail relay (ODMR)?(a) protocol for SMTP security(b) an SMTP extension(c) protocol for web pages(d) protocol for faster mail transferI have been asked this question in quiz.This is a very interesting question from SMTP topic in section Application Layer of Computer Network

Answer»

The correct CHOICE is (b) an SMTP extension

Explanation: ODMR is an extension to SMTP, in which mails are RELAYED to the receivers after they are authenticated. It ALLOWS only the authorized receivers to receive the mail.

93.

Which one of the following protocol is used to receive mail messages?(a) SMTP(b) Post Office Protocol (POP)(c) Internet Message Access Protocol (IMAP)(d) FTPI had been asked this question during a job interview.My doubt stems from SMTP topic in section Application Layer of Computer Network

Answer» RIGHT option is (d) FTP

To EXPLAIN: FTP is used to SHARE files. SMTP, POP and IMAP are the PROTOCOLS used to send and receive mails on the internet.
94.

SMTP uses which of the following TCP port?(a) 22(b) 23(c) 21(d) 25I got this question during an online exam.Question is from SMTP topic in chapter Application Layer of Computer Network

Answer»

Correct option is (d) 25

Easiest explanation: Port 21 is used for FTP control connection, port 22 is used by SSH, and port 23 is used by TELNET.

95.

SMTP connections secured by SSL are known as _____________(a) SMTPS(b) SSMTP(c) SNMP(d) STARTTLSI have been asked this question in an online interview.This key question is from SMTP in section Application Layer of Computer Network

Answer»

Correct option is (a) SMTPS

The best explanation: SSMTP is a simple mail transfer PROGRAM to send mail from a local PC to a mail host. SNMP is a NETWORK management protocol. STARTTLS connections are secured by TLS.

96.

Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.(a) TCP(b) UDP(c) DCCP(d) SCTPI have been asked this question during an interview.This key question is from SMTP in division Application Layer of Computer Network

Answer»

The correct choice is (a) TCP

Explanation: Since TCP is a reliable PROTOCOL, it’s more EFFICIENT to use TCP protocol for e-mail transfer. TCP also provides more security than other TRANSPORT layer protocols.

97.

User agent does not support this ___________(a) Composing messages(b) Reading messages(c) Replying messages(d) Routing messagesThe question was asked during a job interview.This interesting question is from SMTP in section Application Layer of Computer Network

Answer» CORRECT choice is (d) Routing messages

To EXPLAIN: The user AGENT is basically a software program that allows the user to send, and receive e-mail messages. Routing of the MESSAGE is done by the Message Transfer Agent.
98.

When the sender and the receiver of an email are on different systems, we need only _________(a) One MTA(b) Two UAs(c) Two UAs and one MTA(d) Two UAs and two MTAsThe question was asked during an interview.My doubt is from SMTP topic in chapter Application Layer of Computer Network

Answer»

The correct option is (d) TWO UAs and two MTAs

For explanation I would say: The sender’s User Agent (UA) submits the message to a Message Transfer Agent (MTA). Then the MTA sends the message to another MTA i.e. a mail RELAY. Then the RECEIVER receives the message from the mail relay WHENEVER it is AVAILABLE.

99.

Which of the following is an example of user agents for e-mail?(a) Microsoft Outlook(b) Facebook(c) Google(d) TumblrThis question was posed to me in an interview.My question is from SMTP in division Application Layer of Computer Network

Answer»

Correct option is (a) Microsoft Outlook

For explanation: AMONG the options, only Microsoft Outlook is an e-mail agent. Google is a search engine and Facebook, and TUMBLR are social networking platforms. Gmail and ALPINE are some other examples of e-mail agent.

100.

A session may include ________(a) Zero or more SMTP transactions(b) Exactly one SMTP transactions(c) Always more than one SMTP transactions(d) Number of SMTP transactions cant be determinedThe question was asked in quiz.The origin of the question is SMTP in division Application Layer of Computer Network

Answer»

Correct option is (a) Zero or more SMTP TRANSACTIONS

To explain I would say: An SMTP session CONSISTS of SMTP transactions only even if no transactions have been PERFORMED. But no transactions in the session MIGHT mean that the session is inactive or is just initiated.