Flooding is also a……... algorithm, usually generates ………... of duplicate packets.
A. Static, vast number
B. dynamic , vast number
C. Static, less number
D. dynamic , less number

1 Answer

Answer :

A. Static, vast number

Related questions

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above

Last Answer : hot potatorouting

Description : Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a ……… A. Static , routing table B. Dynamic, look-up table C. Dynamic, routing table D. Static, look-up table

Last Answer : C. Dynamic, routing table

Description : Which of the following statement is False about the efficiency of the given channel? a. If we want to send big packets on the channel, then Stop and Wait is good choice. b. If length ... is directly proportional to efficiency of channel. d. Efficient might be less if capacity of channel is high

Last Answer : Distance between sender and receiver is directly proportional to efficiency of channel.

Description : Which type of channel it is where the number of users are stable and the traffic is not bursts? A. static channel B. dynamic channel C. free channel D. both a and c

Last Answer : A. static channel

Description : In _______, a tableassociating a logicaladdress with a physical address is updated manually. A) static mapping B) dynamic mapping C) physical mapping D) noneof the above

Last Answer : static mapping

Description : A _______routingtable is updated periodically using one of the dynamic routingprotocols. A) static B) dynamic C) hierarchical D) none of the above

Last Answer : dynamic

Description : A _______routingtable contains information entered manually. A) static B) dynamic C) hierarchical D) none of the above

Last Answer : static

Description : A ……………………….. is built from the information exchanged by routing protocols. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : B. dynamic routing table

Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : A. static routing table

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above

Last Answer : exactly 10

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed A. exactly 10 B. less than 10 C. more than 10 D. none of the above

Last Answer : B. High-level data link control

Description : Which of the following algorithms is not a broadcast routing algorithm ? (A) Flooding (B) Multidestination routing (C) Reverse path forwarding (D) All of the above

Last Answer : (D) All of the above

Description : In link state routing algorithm after construction of link state packets, new routes are computed using: (1) DES algorithm (2) Dijkstra's algorithm (3) RSA algorithm (4) Packets 

Last Answer : Answer: 2

Description : Which algorithm is used to decide the path to transfer the packets from source to destination? (1) Routing (2) Pathing (3) Selecting (4) Directing

Last Answer : Routing

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225

Last Answer : b. 250

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : The ________is a three layer network protocol that contains addressing information and some control information that enables packets to be routed: a) User Datagram Protocol b) Internet Protocol c) Dynamic Host Configuration Protocol d) None of These

Last Answer : b) Internet Protocol

Description : Vertical analysis is also known as ------------------ a) Dynamic analysis b) Static analysis c) External nalysis d) Internal analysis

Last Answer : b) Static analysis

Description : Horizontal analysis is also known as ----------------------- a) Static analysis b) Structural analysis c) Dynamic analysis d) None of these

Last Answer : c) Dynamic analysis

Description : RPF eliminates the ________ in theflooding process. A) forwarding B) backwarding C) flooding D) none of the above

Last Answer : none of the above

Description : Define Reliable flooding.

Last Answer : It is the process of making sure that all the nodes participating in the routing protocol get a copy of the link state information from all the other nodes.

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : A ________ switch is a multistageswitch with microswitches at each stagethat route the packets based on theoutput port representedas a binary string. A) crossbar B) TSI C) banyan D) none of the above

Last Answer : banyan

Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL5

Description : In ATM,_______is for short packets. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL2

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM

Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above

Last Answer : in the early 1960s for military communication systems, mainly to handle speech

Description : Which of the following condition is usedto transmit two packets overa medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above

Last Answer : Collision

Description : Which of the following system calls results in the sending of SYN packets? a. socket b. bind c. listen d. connect

Last Answer : d. connect

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : Packets will be transferred in how many types? a. 5 types b. 4 types c. 2 types d. 3 types

Last Answer : d. 3 types

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : Which of the following is not correct in relation to multi-destination routing? a. is same as broadcast routing b. contains the list of all destinations c. data is not sent by packets d. there are multiple receivers

Last Answer : c. data is not sent by packets

Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes

Last Answer : c. packets

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination

Last Answer : A. source, destination

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion