DDP stands for _________
a. Datagram Delivery Protocol
b. Device Delivery Protocol
c. Datagram Device Protocol
d. Device Datagram Protocol

1 Answer

Answer :

a. Datagram Delivery Protocol

Related questions

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : IP is _________ datagram protocol. A) an unreliable B) a connectionless C) botha and b D) noneof the above

Last Answer : botha and b

Description : FCP stands for _________ a. Fiber Channel Protocol b. Field Channel Protocol c. Fast Channel Protocol d. Fiber Carrying Protocol

Last Answer : a. Fiber Channel Protocol

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : The protocol data unit (PDU) for the application layer in the Internet stack is? a. Datagram b. Frame c. Message d. Segment

Last Answer : c. Message

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : The protocol data unit PDU for the Transport layer in the Internet stack is A. Segment B. Datagram C. Message/Data D. Frame

Last Answer : A. Segment

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : The protocol data unit(PDU) for the application layer in the Internet stack is (A) Segment (B) Datagram (C) Message/Data (D) Frame

Last Answer : (C) Message/Data

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : UDP stands for: a) User Datagram Protocol b) User Defined Protocol c) Un - Dispatched Protocol d) None of These

Last Answer : a) User Datagram Protocol

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : In _________, resources areallocatedon demand. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : The ……… protocol is based on end-to- end delivery. a. SMTP b. TCP c. IP d. SCTP

Last Answer : a. SMTP

Description : The ______ protocol is based on end-to-end delivery. A. SCTP B. TCP C. SMTP D. SCTP

Last Answer : C. SMTP

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : The term IPv4 stands for? a. Internet Protocol Version 4 b. Internet Programming Version 4 c. International Programming Version 4 d. None of these

Last Answer : a. Internet Protocol Version 4

Description : RIP stands for ________ a. Reduced Information Protocol b. Routing Internet Protocol c. Routing Information Protocol d. Reduced Internet Protocol

Last Answer : c. Routing Information Protocol

Description : ICMP stands for __________ a. Internet Coordinate Message Protocol b. Internet Control Message Protocol c. Interconnect Control Message Protocol d. Interconnect Coordinate Message Protocol

Last Answer : b. Internet Control Message Protocol

Description : HTTP stands for? a. Hyper terminal tracing program b. Hypertext tracing protocol c. Hypertext transfer protocol d. Hypertext transfer program

Last Answer : c. Hypertext transfer protocol

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : SLIP stands for………………………….. A. Syncronous Level Interface Protocol B. Serial Line Interface Protocol C. Syncronous Level Internet Protocol D. Serial Line Internet Protocol

Last Answer : D. Serial Line Internet Protocol

Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None

Last Answer : C. Hyper Text Transfer Protocol Secure

Description : Inthe _________ protocol weavoid unnecessary transmissionby sending only frames that are corrupted. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above

Last Answer : Selective-Repeat ARQ

Description : ICMP is a _________ layer protocol. A) datalink B) transport C) network D) noneof the above

Last Answer : network

Description : The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : distancevector

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Transmission protocol, PRMA stands for _________ a) Pocket reservation multiple access b) Packet register multiple access c) Pocket register multiple access d) Packet reservation multiple access

Last Answer : d) Packet reservation multiple access

Description : A switchin a datagram network uses arouting tablethat is based on the ______address. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : The network layer in the Internet isdesigned as a __________network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : datagram

Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : A switched WAN is normally implemented as a _______ network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : In _______ there are no setup or teardown phases. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In __________, eachpacket is treatedindependentlyof all others. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : In _______, the resources need to bereserved during the setup phase; the resources remain dedicated for the entire durationof data transfer phase until the teardownphase. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : circuit switching

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : In ATM,_____ is for conventionalpacket switching(virtual-circuit approachor datagram approach). A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL3/4

Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above

Last Answer : priority

Description : In IPv4, when a datagram is encapsulated in a frame, the total sizeof the datagram must beless thanthe _______. A) MUT B) MAT C) MTU D) noneof the above

Last Answer : MTU

Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen

Last Answer : hoplimit