Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical
Last Answer : (A) Port
Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP
Last Answer : C. port
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address
Last Answer : c. network address & host address
Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address
Last Answer : C. network address & host address
Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : hedestination IP address in the datagram header
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : c. i, ii, iii, iv
Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number
Last Answer : d. Destination port number
Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long
Last Answer : D. 16 bit long
Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long
Last Answer : d. 16 bit long
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default
Last Answer : host-specific
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : address use 7 bits for the and 24 bits for the portion of the IP a. address. b. Class A c. Class B d. Class C e. Class D
Last Answer : a. address.
Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223
Last Answer : a. 158
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Last Answer : all of theabove
Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above
Last Answer : IP
Description : Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address
Last Answer : c) port address
Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application
Last Answer : b. Host to host
Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC
Last Answer : DDCMP does not need special hardware to final the beginning of a message
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only
Last Answer : D) All i, ii, iii, iv and v only
Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address
Last Answer : Finding the MAC address that corresponds to an IP address
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)
Last Answer : b. ARP (Address Resolution Protocol)
Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address
Last Answer : D. IP address
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol
Last Answer : B. ARP Address Resolution Protocol
Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above
Last Answer : b. DHCP
Description : The combination of an IP address and a port number is known as ................... (A) network number (B) socket address (C) subnet mask number (D) MAC address
Last Answer : (B) socket address
Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address
Last Answer : flow label
Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above
Last Answer : D) All of the above
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall
Last Answer : 2) Packet Filtering Firewall
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall
Last Answer : 2 Packet Filtering Firewall
Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application
Last Answer : d.application
Description : The _______ field of the IGMP message is all zeros in a query message. A) version B) type C) group address D) noneof the above
Last Answer : group address
Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
Last Answer : UDP
Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned
Last Answer : d.all of the mentioned
Description : MAC Address is the example of a. Transport Layer b. Data Link Layer c. Application Layer d. Physical Layer
Last Answer : b. Data Link Layer
Description : The function of IP adress is …………………………………………. A. host identification B. network interface identification C. location addressing D. all of the above
Last Answer : D. all of the above
Description : SMTP is based on …………………………………..delivary, contacts on well known port number…………………………… A. host to host, 23 B. host to host, 25 C. end to end , 23 D. end to end, 80
Last Answer : B. host to host, 25
Description : The Application layer offers _______ service. A. End to end B. Process to process C. Both End to end and Process to process D. None of the mentioned
Last Answer : A. End to end