Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling
Last Answer : A) Tunneling
Description : What does PPTP stand for ? Point to Point Transmission Protocol Point to Point Transfer Protocol Point to Point Tunneling Protocol Point to Point Traffic Protoco
Last Answer : Point to Point Tunneling Protocol
Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : C) SSL record protocol
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : What law allows the Government to take remedial actions against contracts for acts that directly support or advance trafficking in persons?
Last Answer : There are several laws concerning human slavery and sex trafficking. The 14 amendment establishes due process and makes slavery legal. Federal Laws address slavery and the traffic in humans. This can include charges of kidnapping, profits from sex or drug trades.
Description : Native – protocol pure Java converts ……….. into the ………… used by DBMSs directly. A) JDBC calls, network protocol B) ODBC class, network protocol C) ODBC class, user call D) JDBC calls, user call
Last Answer : A) JDBC calls, network protocol
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : Under immoral traffic (prevention) act 1956, a trafficking police officer can a) arrest a suspect only with an arrest warrant b) search premises of the accused her/himself, with a search ... person found during the search from the premises of the accused, only after permission from the accused
Last Answer : c) search premises of the accused without any search warrant, but with two respectable witnesses
Description : ………… is another kind of fiber optic network with an active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NE
Last Answer : A) S/NET
Description : .............. is another kind of fiber optic network with active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NET
Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes
Last Answer : (4) 5 bytes
Description : ………………….. is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s. A) Ethernet B) Fast Ethernet C) Gigabit Ethernet D) All of the above
Last Answer : B) Fast Ethernet
Description : ............ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbits/s against the original Ethernet speed of 10 Mbit/s. A) Ethernet B) Fast Ethernet C) Gigabit Ethernet D) All of the above
Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex
Last Answer : B) Half-duplex
Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : D) Internet Control Message Protocol (ICMP)
Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B
Last Answer : D) A and B
Description : Which is the protocol for performing RPCs between applications in a language and system independent way? (A) Hyper Text Transmission Protocol (HTTP) (B) Simple Network Management Protocol (SNMP) (C) Simple Object Access Protocol (SOAP) (D) Simple Mail Transfer Protocol (SMTP)
Last Answer : (C) Simple Object Access Protocol (SOAP)
Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? (A) 4 (B) 8 (C) 15 (D) 16
Last Answer : (C) 15
Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above
Last Answer : tunneling
Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False
Last Answer : A) True, True
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe
Last Answer : A) FTP
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Description : What is the data link protocol that is used in asynchronous transmission for transferring files from one computer to another? A. A modem B. X modem C. B modem D. C modem
Last Answer : B. X modem
Description : What is the data link protocol that is used in asynchronous transmission for transferring files from one computer to another? A. A modem B. X modem C. B modem
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
Last Answer : SMTP
Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP
Last Answer : d. SMTP
Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP
Last Answer : c. TCP
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? (a) FTP (b) SNMP (c) SMTP (d) RPC
Last Answer : SMTP is used for transferring electronic mail messages from one machine to another.
Description : Process Management function of an operating system kernel includes. A) Process creation and termination. B) Process scheduling and dispatching C) Process switching D) All of the above
Last Answer : D) All of the above
Description : When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as................. (A) handoff (B) mobile switching (C) mobile routing (D) cell switching
Last Answer : (A) handoff
Description : To place a sound into a word document, following feature of windows is used: (A) Clip board (B) Task switching (C) C Win App (D) OLE
Last Answer : (D) OLE
Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching
Last Answer : (D) Circuit Switching
Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.
Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.
Description : Pick up the correct statement from the following: (A) The roof slabs of multi-storeyed buildings are constructed monolithically to carry the various floor loads (B) The beams of multi-storeyed ... slab is spanned across the secondary beams provided between the main beams (D) All of these
Last Answer : Answer: Option D
Description : Variation in the drop size of seed can be minimised by (a) Using a short, smooth, small diameter tube with the discharge end close to bottom of furrow. (b) Discharging the seed directly from ... (c) Mechanically transferring the seeds from the metering unit in the furrow. (d) All of the above.
Last Answer : d) All of the above.
Description : SPC stands (A) Standard Protocol Control (B) Stored Program Control (C) Signaling and switching Centre (D) Signaling Process Center
Last Answer : (B) Stored Program Control
Description : In ATM, the ______ layerprovides routing, traffic management, switching, and multiplexing services. A) physical B) ATM C) AAL D) none of the above
Last Answer : ATM
Description : Traffic Handling Capacity is given by (A) Switching capacity ×Theoretical maximum load (B) Switching capacity / Theoretical maximum load (C) Theoretical maximum load / Switching capacity (D) Theoretical maximum load + Switching capacity
Last Answer : (B) Switching capacity / Theoretical maximum load
Description : Traffic Capacity is given by (A) Switching capacity × Theoretical maximum load (B) Switching capacity / Theoretical maximum load (C) Theoretical maximum load / switching capacity (D) Theoretical maximum load × Switching capacity
Last Answer : (A) Switching capacity × Theoretical maximum load
Description : Which action shall be taken by an aircraft in the traffic pattern of an aerodrome experiencing radio failure to indicate difficulties which compel it to land without requiring immediate assistance? a. ... off four times the navigation lights d. Switching on and off four times the landing lights
Last Answer : b. The repeated switching on and off of the landing lights
Description : Which action shall be taken by an aircraft in the traffic pattern of an aerodrome experiencing radio failure to indicate difficulties which compel it to land without requiring immediate assistance? a. ... four times the navigation lights d. Switching on and off four times the landing lights
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : A) SSL handshake protocol
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii
Last Answer : B) i, and ii only
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The anycast service is included in IPV6. A) True, True B) True, False
Last Answer : i) A connection oriented protocol can only use unicast addresses.