The data unit in the TCP/IP layer called a .....
A) Message B) Segment
C) Datagram D) Frame

1 Answer

Answer :

D) Frame

Related questions

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The protocol data unit (PDU) for the application layer in the Internet stack is? a. Datagram b. Frame c. Message d. Segment

Last Answer : c. Message

Description : The protocol data unit PDU for the Transport layer in the Internet stack is A. Segment B. Datagram C. Message/Data D. Frame

Last Answer : A. Segment

Description : The protocol data unit(PDU) for the application layer in the Internet stack is (A) Segment (B) Datagram (C) Message/Data (D) Frame

Last Answer : (C) Message/Data

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : TCP/IP ..................layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) UDP

Description : Explain the services provided by transport layer in TCP/IP model.

Last Answer : Responsibility of process to process delivery of message Ensure that whole message arrives in order. 1. Service point addressing: -several programs run at a time on computer. Delivery is ... transport layer without error(damage or loss or duplication). Error correction is done by retransmission.

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Give the name of protocols used by different layers of TCP/IP. Discuss the function of ARP and RARP.

Last Answer : TCP/IP Model contains following layer. 1) Host-to-Network Layer - It defines characteristics of transmission media. It also concern with delivery of data when two systems are attached to same network ... such broadcasts are not forwarded by routers, so a RARP server is needed on each network. 

Description : The............ layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Which is not the Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : C) i-c, ii-a, iii-d, iv-b

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : Europeans Registry for Internet Numbers (ERIN)

Description : 2.address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : List different classes of IP Address.

Last Answer : Different classes of IP address. Class A Class B Class C Class D Class E

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : What is the commonly used unit for measuring the speed of data transmission? A) Bytes per second B) BaudC) Bits per second D) Both B and C

Last Answer : B) Baud

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : The layer one of the OSI model is A) Physical layer B) Link layer C) Router layer D) Broadcast layer

Last Answer : A) Physical layer

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : Which is the main function of transport layer?

Last Answer : B) End to end delivery

Description : Explain the function of each layer of OSI reference model with neat diagram.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization) Function of OSI model: i. It provides way to understand how internetwork operates. ... Network virtual terminal file transfer access and management mail services and directory services

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer

Last Answer : a.Application layer

Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application

Last Answer : d.application

Description : .In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a. Application layer b. Transport layer c. Link layer d. Session layer

Last Answer : a. Application layer

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption