Routes are built automatically by………………….., manually by the system administrator, or
dynamically by routing protocols.
A. route
B. traceroute
C. ifconfig
D. netstat

1 Answer

Answer :

C. ifconfig

Related questions

Description : The limited capability of this routing table is easily verified with the ………………………... command. A. ping B. traceroute C. route D. netstat

Last Answer : A. ping

Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : A. static routing table

Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above

Last Answer : d. All of the above

Description : The……………………command can determine which interface is used on a system from the messages displayed on the console during a boot. A. dmesg B. traceroute C. ifconfig D. finger

Last Answer : A. dmesg

Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger

Last Answer : C. ifconfig

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : A ……………………….. is built from the information exchanged by routing protocols. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : B. dynamic routing table

Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : OSPF

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : The Dynamic routing table is one _______ A. with manual entries B. which is updated automatically C. MAC entries D. none of the above

Last Answer : B. which is updated automatically

Description : The static routing table is one _______ A. with manual entries B. which is updated automatically C. MAC entries D. none of the above

Last Answer : A. with manual entries

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b

Last Answer : B. -i

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address

Last Answer : D. IP address

Description : The program used to determine the round trip delay between a workstation and a destination address is a. Tracert b. Traceroute c. Ping d. Pop

Last Answer : b. Traceroute

Description : In link state routing algorithm after construction of link state packets, new routes are computed using: (1) DES algorithm (2) Dijkstra's algorithm (3) RSA algorithm (4) Packets 

Last Answer : Answer: 2

Description : In ________ TDM, slots are dynamically allocated to improvebandwidth efficiency. A) synchronous B) statistical C) isochronous D) none of the above

Last Answer : statistical

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : . In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module is loaded the first time a call is made to the kernel that requires the module. A. "m" B. "Y" C. "n" D. "r"

Last Answer : A. "m"

Description : What is the word for something your body does automatically but you can also do manually like breathing or blinking?

Last Answer : Autonomic

Description : Equalization of the power factors of two alternators operating in parallel is accomplished _____________. A. manually, by adjusting the governor controls B. automatically, by automatic voltage regulators ... the output of current transformers D. automatically, by the designed action of the governors

Last Answer : Answer: B

Description : A low-voltage protection circuit is used in electric motor starting equipment to _____________. A. trip circuit contactors when the motor overspeeds due to low voltage B. trip circuit ... voltage without manually resetting D. prevent the motor from restarting automatically on restoration of voltage

Last Answer : Answer: D

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : What built-in is used for changing the properties of the window dynamically?

Last Answer : Set_window_property Canvas-View

Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : . A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : The preferred route of administration of medication in the most acute care situations is which of the following routes? a) Intravenous The IV route is the preferred ... ) Intramuscular Intramuscular administration of medication is absorbed more slowly than intravenously administered medication.

Last Answer : a) Intravenous The IV route is the preferred parenteral route in most acute care situations because it is much more comfortable for the patient, and peak serum levels and pain relief occur more rapidly and reliably.

Description : For the treatment of hypogonadism and impotence, testosterone/dihydrotestosterone can be administered by the following route/routes: A. Oral B. Intramuscular C. Transdermal D. Both 'B' and 'C

Last Answer : D. Both 'B' and 'C'

Description : In _______, a tableassociating a logicaladdress with a physical address is updated manually. A) static mapping B) dynamic mapping C) physical mapping D) noneof the above

Last Answer : static mapping

Description : A _______routingtable contains information entered manually. A) static B) dynamic C) hierarchical D) none of the above

Last Answer : static

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : In Frame Relay, when a _____ is selected, the correspondingtable entry is recorded for all switches by the administrator A) PVC B) SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PVC

Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database

Last Answer : Answer: 3

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system

Last Answer : b) protocol stack

Description : In ________ routing, we assume that there is one node (or more) ineach autonomous system that acts on behalf of the entire autonomous system. A) distant vector B) path vector C) link state D) none of the above

Last Answer : path vector

Description : Routing inside an autonomous system is referred to as _______________. A) interdomain routing B) intradomain routing C) both a and b D) none of the above

Last Answer : intradomain routing

Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above

Last Answer : LLC

Description : Both Go-Back-N and Selective-Repeat Protocols use a_________. A) sliding frame B) sliding window C) sliding packet D) none of the above

Last Answer : sliding window

Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : FRAD

Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above

Last Answer : link local

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : What device separates asingle network into two segmentsbut lets the twosegments appear as one tohigher protocols? A. Switch B. Bridge C. Gateway D. Router

Last Answer : Bridge

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size