Vous êtes sur la page 1sur 4

Introduction to Web Technology - Post-Test

1. Four workstations are connected using a Star topology. Find the number of communication links
in the network and communication cost (in terms of number of hops) between two
workstations?
options
a) 4 and 2 b) 8 and 2
c) 8 and 1 d) 4 and 1 answer : a

2. Which of the following protocols is used to transfer files between a client and a server?
options
a) HTTP b) SMTP
c) FTP d) Telnet answer : c

3. Which one of the following is NOT a component of HTTP Response?


options
a) Content- type b) Content- length
c) Status code d) Port number answer : d

4. Assume while browsing Internet, in your web browser you have typed a URL and the DNS will
convert this URL in to an appropriate IP-address, suppose your network is connected with
multiple DNS servers and your local DNS is not able to resolve the given URL in to appropriate IP
address, then which of the following can happen?
options answer : c
a) Browser will give an error message `that page not found’
b) This kind of situation never happens
c) Local DNS will forward the request to next DNS connected to it

5. Whenever you open the Infosys in-house leave application, it displays your leave balance. What
is the type of the content?
options
a) Dynamic Content b) Active Content
c) Static Content answer : a

6. Consider a scenario in which you are depending on an ISP and each time you login to the ISP
network using username and password, a new IP address is provided by the ISP to access the
Internet.
Which of the following server provides this kind of IP address?
options
a) DNS server b) Proxy server
c) Groupware server d) DHCP server answer : d

7. A DMZ configuration typically contains:


options answer : c
a) Only one firewall facing the internet
b) Only one firewall facing the LAN
c) Only firewall facing the Internet and another firewall facing the LAN

8. Consider a scenario, where user placed an order for 100 copies of a book through online book
shopping website. Required number of copies is ready to be delivered to the user but now the
user says that the order is not placed from his/her end. Which of the following concept will
ensure that one cannot deny their performed action?
options
a) Availability b) Integrity
c) Non-Repudiation d) Confidentially answer :c

9. A company requires a cost effective solution of having a private communication between two
sites, located in different countries, which should have encryption and authorization features.

Which of the following will be an appropriate solution?


options
a) Firewall b) Proxy Server
c) VPN d) Modem answer : c

10. In Asymmetric Encryption, if a public key is used to encrypt the message, the message can be
decrypted using _____________.
options
a) private Key b) either public key or private key
c) public key answer : a

11. Which of the following component of the URL is implicit when HTTP protocol is used for fetching
the content?
options
a) Protocol b) Port number
c) Hostname d) Path answer : b

12. Which of the following is TRUE in two Tier Client-Server Architecture?


options answer : a
a) Low security and application reuse is poor
b) High security and application reuse is maximum
c) High security and application reuse is poor
d) Low security and application reuse is maximum

13. Which of the following statement is INCORRECT about Internet?


options
a) Owned by single entity
b) Have publicly Known IP Addresses
c) Information access is open to everyone
d) Is less secure answer :a

14. XYZ Company was facing a problem in its web application. Initially, the company's web
application was accessed by less than 100 users and the response was quick. Later, the web
application performance got worse when the number of users accessing application was
increased to 1000. Which of the following Non-functionality is lagging in the web application?
Note: The Company doesn't want to deploy more than one server.
options
a) Availability b) Scalability c) Load balancing d) Turnaround time of
the application answer :b

15. Which is the correct and complete TCP/IP sequence from top to bottom?
options answer :d
a) Application Layer, Internet Layer, Transport Layer, Network Access Layer
b) Network Access Layer, Transport Layer, Internet Layer, Application Layer
c) Network Access Layer, Internet Layer, Transport Layer, Application Layer

d) Application Layer, Internet Layer, Transport Layer, Network Access Layer

16. Which of the following statement(s) is/are FALSE about firewall?

I. Firewall can be implemented in either software or hardware

II. Assigns IP address to a machine, when it demands

III. Protects the internal network resources from unauthorized access

IV. Translates the domain name to IP address


options answer : a
a) Only II and IV b) Only I, II and III
c) Only I, II and IV d) Only I and III

17. Which of the following application security consideration deals with identity verification?
options answer : a
a) Authentication b) Authorization
c) Confidentially d) Data Integrity

18. Which of the following load balancing schemes can detect which server is overloaded?
options
a) Distributed Content (Among Host)
b) Distributed Content (Among provider)
c) DNS Load Balancing
d) Hardware and Software Load Balancing answer : d
19. Which of the following device is used for interconnecting heterogeneous networks?
options
a) Router b) Repeater
c) Bridge d) Gateway answer : d

20. Which of the following statements are FALSE about HTML?


options
a) Universal standard for developing web pages
b) Simple to understand and use
c) Browser and platform dependent
d) Case insensitive language answer : c

Vous aimerez peut-être aussi