Protocols — Set 5
Computers · प्रोटोकॉल · Questions 41–50 of 70
Which protocol is used to provide security for credit card transactions on the early internet?
Correct Answer: A. SET
SET or Secure Electronic Transaction was a protocol developed by Visa and Mastercard for safe online payments. While it provided high security, it was complex to implement and was eventually replaced by SSL/TLS. It used digital signatures to authenticate all parties in a transaction.
Which protocol is used to remotely manage hardware components and monitor temperature or power levels in a server?
Correct Answer: B. IPMI
IPMI or Intelligent Platform Management Interface allows for 'out-of-band' management of a computer system. It works even if the operating system is crashed or the server is powered off. It is a crucial tool for data center administrators.
Which protocol is used for simple, low-overhead communication where individual packet loss is not critical?
Correct Answer: C. UDP
UDP is a connectionless protocol that sends data without any prior handshake. This lack of overhead makes it ideal for time-sensitive tasks like online gaming or DNS queries. It is a 'best-effort' delivery system with no built-in reliability.
Which protocol is used by routers to share information about which networks they can reach?
Correct Answer: C. Routing Protocol
Routing protocols like OSPF, RIP, or BGP are the languages routers use to talk to each other. They allow routers to dynamically learn the network topology and adjust to failures. Without these protocols, the internet would require manual configuration of every path.
Which protocol is used to fetch the current date and time from a reference clock on the internet?
Correct Answer: A. NTP
NTP or Network Time Protocol ensures that all devices on a network have the same time. It uses a hierarchy of time sources, with atomic clocks at the top (Stratum 0). Synchronized time is vital for security protocols like Kerberos to function.
Which protocol is the standard for communication between an IoT device and a cloud server due to its low power usage?
Correct Answer: B. MQTT
MQTT or Message Queuing Telemetry Transport is a publish-subscribe based messaging protocol. It is designed for remote locations where a small code footprint is required or network bandwidth is limited. It is the most popular protocol for Internet of Things (IoT) connectivity.
Which protocol is used to translate a physical MAC address back into an IP address?
Correct Answer: C. RARP
RARP was the predecessor to DHCP and allowed a device to request its IP from a server. It required a physical address to be mapped to an IP in a central table. While obsolete now, it is a classic example of address resolution logic.
Which protocol is responsible for the 'handshake' that starts a secure HTTPS session?
Correct Answer: A. SSL/TLS
The TLS handshake allows the client and server to authenticate each other and negotiate encryption keys. It happens after the TCP connection is established but before any actual web data is sent. This process ensures that the upcoming communication is private and secure.
Which protocol is used to manage a pool of IP addresses and assign them to clients dynamically?
Correct Answer: B. DHCP
DHCP prevents IP address conflicts by ensuring that no two devices on the same network have the same address. It also provides other information like the default gateway and DNS server IP. It is used in almost every home and office Wi-Fi network.
Which protocol is used to transfer web pages across the internet securely?
Correct Answer: B. HTTPS
HTTPS is the standard for modern web traffic, combining HTTP with encryption. Browsers often display a padlock icon to show that a connection is using this protocol. It is essential for protecting user privacy in the digital age.