In ……………………. mode, a common technique in packet-switched networks consists of wrapping a  packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above

1 Answer

Answer :

C) Both A and B

Related questions

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : _____ is used for transmission of packets in the cellular switched architecture. a) Packet switching techniques b) Circuit switching techniques c) Packet and circuit switched technique d) Datagram technique

Last Answer : a) Packet switching techniques

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching

Description : ………………….. is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling B) Transferring C) Trafficking D) Switching

Last Answer : A) Tunneling

Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above

Last Answer : tunneling

Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading

Last Answer : A) Encapsulation

Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.

Last Answer : (1) Neither I nor II is correct.

Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading

Last Answer : A) Inheritance

Description : What is Encapsulation? How is it implemented in Java?

Last Answer : A: Binding up of data and associated functions together into a single unit called (class) is called Encapsulation. In Java, it is implemented by the use of a class.

Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation 

Last Answer : (B) Inheritance

Description : The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as (A) Association (B) Aggregation (C) Encapsulation (D) Generalisation

Last Answer : (B) Aggregation

Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction

Last Answer : (C) Encapsulation

Description : A network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. a. virtual-circuit b. packet-switched c. None of the Given d. frame-switched

Last Answer : a. virtual-circuit

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward

Last Answer : A. Point-to-Point channels and Broadcast channels

Description : BSNL land line telephone network is an example of a network. A. Packet switched B. Circuit switched C. Bit switched D. Line switched

Last Answer : B. Circuit switched

Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched

Last Answer : b) Circuit switched

Description : The required resources for communication between end systems are reserved for theduration of the session between end systems in method. a. Packet switched b. Bit switched c. Line switched d. Circuit switched

Last Answer : d. Circuit switched

Description : A local telephone network is an example of a network. a. Packet switched b. Circuit switched c. Bit switched d. Line switched

Last Answer : b. Circuit switched

Description : The ________is a circuit-switched network, while the ______is a packet-switched network. (A) Telephone, ATM (B) SONET and FDDI (C) Satellite, Telephone (D) FDDI and SONET

Last Answer : (A) Telephone, ATM

Description : Which of the following feature makes impossible to eavesdrop on GSM radio transmission? a) SIM b) On the air privacy c) SMS d) Packet switched traffic

Last Answer : b) On the air privacy

Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony

Last Answer : c) Call diversion

Description : Which of the following does not come under the teleservices of GSM? a) Standard mobile telephony b) Mobile originated traffic c) Base originated traffic d) Packet switched traffic

Last Answer : d) Packet switched traffic

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : What four switched networks are part of the defense communications system?

Last Answer : AUTOVON, AUTOSEVOCOM, AUTODIN, and DSSCS.

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : In _______delivery, the deliverer of theIP packet and the destination are on different networks. A) aconnection-oriented B) a direct C) an indirect D) none of the above

Last Answer : an indirect

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth

Last Answer : A. Reliability

Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

Last Answer : c) router

Description : Which tool allows a user to simulate real networks? a.artificial intelligence b.Packet Tracer c.internet d.PAN

Last Answer : b.Packet Tracer

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Internet is ................. A) Network of Networks B) Networks of Communication C) Networks of Data D) Group of LAN

Last Answer : A) Network of Networks

Description : Slots and facets are used in (A) Semantic Networks (B) Frames (C) Rules (D) All of these

Last Answer : (B) Frames

Description : Consider the following statements : (a) Boolean expressions and logic networks correspond to labelled acyclic digraphs. (b) Optimal Boolean expressions may not correspond to simplest networks. (c) Choosing essential blocks first in a Karnaugh map ... (b) only (C) (a) and (b) (D) (a), (b) and (c)

Last Answer : (D) (a), (b) and (c) 

Description : Which of the following neural networks uses supervised learning? (A) Multilayer perceptron (B) Self organizing feature map (C) Hopfield network (1) (A) only (2) (B) only (3) (A) and (B) only (4) (A) and (C) only

Last Answer : (1) (A) only

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : D) Both A and B