To avoid ambiguity, the names assigned to machines must be carefully selected from a
______ with complete control over the binding between the names and IP addresses
A. Table
B. look up table
C. name space
D. name table

1 Answer

Answer :

C. name space

Related questions

Description : An initial (first-time) audit requires more audit time to complete than a recurring audit. One of the reasons for this is that a. New auditors are usually assigned to an initial audit. b. A ... unfamiliar to the auditor and need to be carefully studied. d. Predecessor auditors need to be consulted.

Last Answer : The client's business, industry, and internal control are unfamiliar to the auditor and need to be carefully studied

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream

Last Answer : a. inserting a 0 in user stream to differentiate it with a flag

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above

Last Answer : IP

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node

Last Answer : b. Network.Network.Node.Node

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : The Internet addresses are ______ bits in length in IPV4 addressing scheme A. 16 B. 64 C. 32 D. 48

Last Answer : C. 32

Description : In Frame Relay, when. ______ is selected, it requires establishing andterminatingphases A) a PVC B) an SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : an SVC

Description : In _______forwarding, the mask anddestination addresses are both 0.0.0.0 in therouting table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : default

Description : On which factors do the size of block depends in classless addressing? a. Nature & size of an entity b. Number of addresses c. Availability of the address space d. All of the above

Last Answer : a. Nature & size of an entity

Description : The firstaddressassignedto an organization in classless addressing_______. A) must bea powerof 4 B) must beevenly divisible by the number of addresses C) must belong to one of the A, B, or C classes D) none of the above

Last Answer : must beevenly divisible by the number of addresses

Description : ------------ is a condition in which the decision maker chooses a course of action without complete knowledge of the consequences that will follow implementation. (a) Risk ; (b) Uncertainty ; (c) Ambiguity ; (d) Accuracy

Last Answer : (b) Uncertainty ; 

Description : If a manager at Wipro wants to award a contract for printing the company's promotional literature and has obtained quotations from several printers, the manager can select a printer and know with ______ what the printing should cost. (a) Ambiguity ; (b) Risk ; (c) Uncertainty ; (d) Certainty

Last Answer :  (d) Certainty 

Description : A channel strategy that limits availability of products to a few carefully selected outlets in a given market area is called ______________ 1. Selective channel 2. Intensive channel 3. Both 1 & 2 4. Neither 1 nor 2 5. None of these

Last Answer : Selective channel

Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : host-specific

Description : In one corner of its magazine advertisement for office copiers, Pitney Bowes places a small box asking for the names and addresses of individuals or companies seeking more information. Pitney has ... facilitate ______ for this communication. A)decoding. B)feedback. C)encoding. D)noise reduction.

Last Answer : D)noise reduction.

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned

Last Answer : C. Port

Description : The ______RMS must inspect every ______at intervals of about ____such offices and sections in his sub division as are assigned to him by the ______ a) ASP, twelve months six months, Head of the Circle ... c) Sub divisional Inspector, twelve months six months, Head of the Circle d) None of these

Last Answer : c) Sub divisional Inspector, twelve months six months, Head of the Circle

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called .................. (A) Symbol resolution (B) Parsing (C) Assembly (D) Relocation

Last Answer : (D) Relocation

Description : Read the following passage carefully. (1) Automated Teller Machines (ATM) have revolutionisod banking

Last Answer : Read the following passage carefully. (1) Automated Teller Machines (ATM) have revolutionisod banking ... of the passage in about 80 words.

Description : What happens to ip addresses if there are over 4,23 billion internet users.

Last Answer : answer:IPv6 This is planned for. I wouldn’t worry about it.

Description : What Inventory privilege is automatically assigned when another privilege is selected?

Last Answer : Need answer

Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol that handles error andcontrol messages

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : The _______ is a unidirectional protocol that has no flow or error control. A. Simplest B. Simplex C. TCP/IP protocol D. Simplest or Simplex

Last Answer : D. Simplest or Simplex

Description : The IP Control Protocol (IPCP) is the NCP for IP and is responsible for ………., …………., and disabling the IP protocol on both ends of the point-to-point link. A. Reframing , enabling B. Deleting, reframing C. configuring, enabling, D. configuring, reframing

Last Answer : C. configuring, enabling,

Description : You and nine other individuals have been captured by super intelligent alien overlords. The aliens think humans look quite tasty, but their civilization forbids eating highly logical and cooperative beings. ... , each of you must guess the color of your hat starting with the perso -Riddles

Last Answer : Let's see how it would play out if the hats were distributed like this. The tallest captive sees three black hats in front of him, so he says 'black,' telling everyone else he sees an odd ... go. It looks like these aliens will have to go hungry, or find some less logical organisms to abduct.

Description : The nurse teaches the patient about glargine (Lantus), a peakless basal insulin including which of the following statements? a) Do not mix the drug with other insulins Because glargine is in a ... action Glargine is a peakless basal insulin that is absorbed very slowly over a 24-hour period.

Last Answer : a) Do not mix the drug with other insulins Because glargine is in a suspension with a pH of 4, it cannot be mixed with other insulins because this would cause precipitation. When administering ... to read the label carefully and to avoid mistaking Lantus insulin for Lente insulin and vice versa.

Description : An internet protocol address (IP address) is: a) a numerical label assigned to each device (e.g. computer, printer) participating in a computer network b) It working for the communication c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An internet protocol address (IP address) is: a) a numerical label assigned to each device (e.g. computer, printer) participating in a computer network b) It working for the communication c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host?  A) 16 bits B) 32 bits C) 48 bits D) 64 bits

Last Answer : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host?  32 bits

Description : What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

Last Answer : Which is assigned one and only one task

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access