Description : _____ is an ideaor concept that isa precursor to an Internet standard. A) RCF B) RFC C) ID D) none of the above
Last Answer : RCF
Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP
Last Answer : A. DHCP, BOOTP
Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : A set of rules that governs data communication is called a. Protocols b. Standards c. RFCs d. Servers
Last Answer : a. Protocols
Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above
Last Answer : d. All the above
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : State whether the following statements are true/false: 1) The standards of TCP/IP are published in a series of documents called NFC. 2) A Protocol is an agreement between the communicating parties on how communication is to proceed. a. 1.F,2.T b. 1.F, 2.F c. 1.T, 2.T d. 1.T, 2.F
Last Answer : a. 1.F,2.T
Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols
Last Answer : c. Transport protocols
Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system
Last Answer : b) protocol stack
Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above
Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : B. 1. true, 2. false, 3.true
Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above
Last Answer : link local
Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer
Last Answer : d. Application layer
Description : What are the common protocols associated with the network layer? a. Address Resolution Protocol b. Reverse Address Resolution Protocol c. Internet protocol d. Neighbour Discovery Protocol
Last Answer : c. Internet protocol
Description : Which of the following statements is a standard applicable to financial statement audits in accordance with Government Auditing Standards? a. An auditor should briefly describe in the auditor's ... whether the entity has reportable measures of economy and efficiency that are valid and reliable.
Last Answer : An auditor should report on the scope of the auditor's testing of internal control.
Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252
Last Answer : 255.255.255.224
Description : The three documents - UDHR, ICCPR and ICESCR along with two optional protocols to the ICCPR constitutes - (a) International Humanitarian Law (b) The Commission of Human Rights (c) The International Bill of Human Rights (d) Developmental Rights
Last Answer : (c) The International Bill of Human Rights
Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned
Last Answer : None of the mentioned
Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above
Last Answer : LLC
Description : Both Go-Back-N and Selective-Repeat Protocols use a_________. A) sliding frame B) sliding window C) sliding packet D) none of the above
Last Answer : sliding window
Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : FRAD
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
Last Answer : Layer 7 protocols
Description : What device separates asingle network into two segmentsbut lets the twosegments appear as one tohigher protocols? A. Switch B. Bridge C. Gateway D. Router
Last Answer : Bridge
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : Which of the following is used for modulation and demodulation? A. modem B. protocols C. gateway D. multiplexer E. None of the above
Last Answer : modem
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe
Last Answer : A) FTP
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol
Last Answer : d. Session Initiation Protocol
Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine ? a. POP3 b. IMAP c. SMTP d. DMSP
Last Answer : b. IMAP
Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only
Last Answer : c. (ii) and (iv) only
Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP
Last Answer : a. HTTP, FTP
Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above
Last Answer : b. DHCP
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP
Last Answer : c. TCP
Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP
Last Answer : c. UDP, TCP, UDP and TCP
Description : Transport layer protocols deals with _____ a. application to application communication b. process to process communication c. node to node communication d. man to man communication
Last Answer : b. process to process communication
Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP
Last Answer : c. TCP and UDP
Description : Routes are built automatically by………………….., manually by the system administrator, or dynamically by routing protocols. A. route B. traceroute C. ifconfig D. netstat
Last Answer : C. ifconfig
Description : A ……………………….. is built from the information exchanged by routing protocols. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b
Last Answer : B. dynamic routing table
Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. False, 3. true
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails