MFT
(1)_______ layer of the OSI model is responsible for providing services to end-users?
a) Physical layer
b) Data Link layer
c) Transport layer
d) Application layer
(2)________ protocol is used by the Application layer to transfer files between hosts?
a) SMTP
b) FTP
c) HTTP
d) DNS
(3) ______ is used by the Application layer for sending and receiving email?
a) SMTP
b) FTP
c) HTTP
d) DNS
(4) ______ protocol is used by the Application layer for resolving domain names to
IP addresses?
a) SMTP
b) FTP
c) HTTP
d) DNS
(5) ______ protocol is used by the Application layer for accessing web pages?
a) SMTP
b) FTP
c )HTTP
d)DNS
(6) ______ Application layer protocol is used for real-time communication, such as
video conferencing?
a) SIP
b) SNMP
c) RTP
d) SSH
(7 ) The purpose of the Simple Mail Transfer Protocol (SMTP) in the Application
layer is______
a) To transfer files between hosts
b) To send and receive email
c) To resolve domain names to IP addresses
d) To access web pages
(8) The purpose of the Hypertext Transfer Protocol (HTTP) in the Application layer
is______
a) To transfer files between hosts
b) To send and receive email
c) To resolve domain names to IP addresses
d) To access web pages
(9)___________ Application layer protocol is used for remote login and command
execution
a) SSH
b) SNMP
c) DNS
d) FTP
(10) Application layer protocol defines ____________
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
Long Answer
(1) Explain the importance of cryptography .Discuss in detsil two types of
cryptography.
(2) Why is an application such as POP needed for electronic messaging?
(3) Differentiate between HTTP,FTP and SMTP.
(4) Elaborate the wireless connectivity in detail.
(5) Explain firewall and its types.
(6) With the help of diagram explain Zigbee architecture in detail.
(7) Write briefly about World wide web. Also write down the three types of WWW
documents.
(8) Expalin the difference between the public key and private key in Cryptography.
(9) Explain the digital signature process in detail ?
(10) Explain about Application layer and its services in detail.
(11) Explain how security is provided in interact operations in detail
(12) Differntiate between lossy and lossless compression techniques.
(13) Differntiate between Bluetooth and Infrared.
(14) Describe the role of a DNS on a computer network with reference to its
components.
(15) Discuss the features of HTTP and also discuss how HTTP works.
(16) Explain the working of Electronic mail. How SMTP used in Email applications
(17 ) Write short notes on any two of the following:
a) TELNET
b) BLUETOOTH
c) IEEE802.16 WIMAX
(18) Differentiate between lossy and lossless compression techniques.
(19) Discuss the design issues of application layer.
(20) List and explain various data compression techniques.