Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long
Last Answer : d. 16 bit long
Description : How many bits internet address isassigned to eachhost on a TCP/IP internet which is used in all communications withthehost? A. 16 - bits B. 32 - bits C. 48 - bits D. 64 - bits E. None of the above
Last Answer : 32 - bits
Description : What is the size of an IP address? A. 64 bit B. 128 bit C. 16 bit D. 32 bit
Last Answer : D. 32 bit
Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number
Last Answer : d. Destination port number
Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP
Last Answer : C. port
Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit
Last Answer : c. 16 bit
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above
Last Answer : D) All of the above
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned
Last Answer : C. Port
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit
Last Answer : C. 8-bit
Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true
Last Answer : D. 1. true, 2. false, 3. true
Description : A 32 bit microprocessor has the word length equal to a. 2 byte b. 32 byte c. 4 byte d. 8 byte
Last Answer : 4 byte
Description : An organization isgranteda block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted? A) 8 B) 16 C) 32 D) none of the above
Last Answer : 16
Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.128/29. How manyaddressesare granted? A) 8 B) 16 C) 32 D) none of the above
Last Answer : 8
Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.64/28. How manyaddresses are granted? A) 8 B) 16 C) 32 D) none of the above
Description : The designers of the Internet Protocol defined an IP address as a ____number: a) 32 Bit b) 34 Bit c) 31 Bit d) None of These
Last Answer : a) 32 Bit
Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above
Last Answer : 48-b
Description : In hexadecimal colon notation, a 128-bit address isdivided into _______ sections, each _____hexadecimal digits in length. A) 8: 2 B) 8: 3 C) 8: 4 D) none of the above
Last Answer : 8: 4
Description : The ________ protocol is the transmission mechanism used by the TCP/IP suite. A) ARP B) IP C) RARP D) noneof the above
Last Answer : IP
Description : _______ is the protocol suite for thecurrent Internet. A) TCP/IP B) NCP C) UNIX D) ACM
Last Answer : TCP/IP
Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above
Last Answer : DHCP Server
Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
Last Answer : UDP
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
Last Answer : SMTP
Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer
Last Answer : b. Session Layer
Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe
Last Answer : A) FTP
Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame
Last Answer : D) Frame
Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) Application
Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC
Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP
Last Answer : A) Telnet
Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer
Last Answer : a.Application layer
Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application
Last Answer : d.application
Description : The ……… protocol is based on end-to- end delivery. a. SMTP b. TCP c. IP d. SCTP
Last Answer : a. SMTP
Description : The TCP/IP …………corresponds to the combined session, presentation, and application layers of the OSI model. a.session layer b.presentation layer c.application layer d.None of the above
Last Answer : c.application layer
Description : Which of the following layers is an addition to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer
Last Answer : d. Session and Presentation layer
Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP
Last Answer : c. TCP
Description : .In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a. Application layer b. Transport layer c. Link layer d. Session layer
Last Answer : a. Application layer
Description : .How many layers are present in the Internet protocol stack (TCP/IP model)? a. 5 b. 7 c. 6 d. 10
Last Answer : a. 5
Description : Which is the additional layer to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer
Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP
Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD
Last Answer : B. CONFIG_INET
Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link
Last Answer : B. physical, data link, network