Question
a.
HTTP GET request, DNS query, TCP SYN
b.
DNS query, HTTP GET request, TCP SYN
c.
DNS query, TCP SYN, HTTP GET request
d.
TCP SYN, DNS query, HTTP GET request
Posted under GATE cse question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host...
Similar Questions
Discover Related MCQs
Q. A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP connections to hosts in the private network. To achieve this the minimum capability of the firewall should be that of
View solution
Q. Which protocol will be used to automate the IP configuration mechanism which includes IP address, subnet mask, default gateway, and DNS information?
View solution
Q. In Go–back 3 flow control protocol every 6th packet is lost. If we have to send 11 packets. How many transmissions will be needed ?
View solution
Q. What will be the total minimum bandwidth of the channel required for 7 channels of 400 kHz bandwidth multiplexed together with each guard band of 20 kHz?
View solution
Q. Which of the following is false:
View solution
Q. The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
View solution
Q. Which of the following protocol is called as byte-oriented protocol?
View solution
Q. If syn = 0 and ack = 1, it indicates
View solution
Q. A DNS.....................server gets its data from another DNS server.
View solution
Q. The .............................field in the MIME header describes the method used to encode the data.
View solution
Q. A client message usually needs ........................ to send mail.
View solution
Q. Which one is not a method of HTTP?
View solution
Q. Which one of the following is a communication protocol used for email?
View solution
Q. Which one of the following statement about email is false?
View solution
Q. Which one of the following can be used on the IP network to monitor a router?
View solution
Q. Which of the following is true?
View solution
Q. Which of the following is not a Block cipher?
View solution
Q. In a ................................attack, an intruder comes between two communicating parties, Intercepting and replying to their messages.
View solution
Q. A computer crime is
View solution
Q. A program that migrates through networks and operating systems by attaching itself to different Programs and databases is a
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!