Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : To implement a ring network we use the ______technology: a) Stand Ring b) Flash Ring c) Token Ring d) None of These
Last Answer : c) Token Ring
Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer
Last Answer : C) Session Layer
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above
Last Answer : session layer
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer
Last Answer : a. session layer
Description : RNA is intimately associated with synthesis of which constituent of the cell. a. Carbohydrates b. Proteins c. Lipids d. Inorganics
Last Answer : Proteins
Description : ―Lencho, who knew his field intimately well.‖ ̳Intimately well‘ refers to _______. (a) The yield expected from the crops. (b) The damage that the land could incur. (c) The prediction that the rain would visit the place. (d) He knew the surrounding areas very well.
Last Answer : (c) The prediction that the rain would visit the place.
Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring
Last Answer : Token
Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits
Last Answer : A : Low costs for hardware and software
Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and softwareB : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits
Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These
Last Answer : a) Internet Control Message Protocol
Description : The first type of firewall was the packet filter which looks at: a) network addresses b) Ports of the packet and determines if that packet should be allowed or blocked c) Both of above d) None of These
Last Answer : c) Both of above
Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These
Last Answer : b) Proxy Server
Description : The fundamental approaches to build a point - to - point network is: a) Circuit Switching b) Packet Switching c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : A packet filtering firewall operates at which of the following OSI layer? 1) At the Application layer 2) At the Transport Layer 3) At the Network Layer 4) Both 2 and 3
Last Answer : 4) Both 2 and 3
Description : A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3
Last Answer : 4 Both 2 and 3
Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect
Last Answer : c.ping
Description : Determine from the following the basic mode of transmission system in the public data network in which data are transferred from the source to the network and from the network to the destination in the frame format. A. Voice mode B. Asynchronous mode C. Synchronous mode D. Packet mode
Last Answer : D. Packet mode
Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol
Last Answer : d) Protocol
Description : What medium is used by IBM token ring network that operates at either 4 Mbps or 16 Mbps? A. Twisted pair B. Coaxial cable C. Fiber-optic D. Parallel-wire line
Last Answer : A. Twisted pair
Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above
Last Answer : token passing
Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable
Last Answer : c. 20 metres of cable.
Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring
Last Answer : c. Bus
Description : A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. (1) 1 (2) 2 (3) 3 (4) 4
Last Answer : (2) 2
Description : What is network topology? List network standards. Explain token ring standard with the help of diagram.
Last Answer : Network topology: A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal ... empty" frame, ready to be taken by a workstation when it has a message to send.
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : What is a token?
Last Answer : A C program consists of various tokens and a token is either a keyword, an identifier, a constant, a string literal, or a symbol.
Description : .is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR
Last Answer : A) FDDI
Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above
Last Answer : reservation
Description : Circuit which gives continuously varying potential is called a. complex network b. wheat stone bridge c. potential divider d. all of above
Last Answer : c. potential divider
Description : Which of the following IS NOT one of the advantages associated with a robotics implementation program? a) Low costs for hardware and software b) Robots work continuously around the clock c) Quality of manufactured goods can be improved d) Reduced company cost for worker fringe benefits
Last Answer : a) Low costs for hardware and software
Description : What three things does a network packet contain?
Last Answer : What is the answer ?
Description : It is a protocol used to connect the other packet witching network A. X.25 B. X.50 C. X.10 D. X.75
Last Answer : D. X.75
Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above
Last Answer : circuit-switched
Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above
Last Answer : destination
Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above
Last Answer : virtual-circui
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : In _______delivery, both thedeliverer of the IP packet and the destination are on the same network. A) aconnectionless B) a direct C) an indirect D) none of the above
Last Answer : a direct
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above
Last Answer : Down through thelayers of the IP architecture and then up thelayers again
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network
Last Answer : d. block some hosts from accessing the network