Which one of the following fields of an IP
header is NOT modified by a typical IP
router?
a. Checksum
b. Source address
c. Time to Live (TTL)
d. Length

1 Answer

Answer :

b. Source address

Related questions

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : The number of network segments on which the datagram is allowed to travel before a router should discard it is called _______. A. Time to Live (TTL) B. Time to Die(TTD) C. self recognition D. both a and b

Last Answer : A. Time to Live (TTL)

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination

Last Answer : A. source, destination

Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : What are the different fields in pseudo header?

Last Answer : ∙ Protocol number ∙ Source IP address ∙ Destination IP addresses.

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long

Last Answer : D. 16 bit long

Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long

Last Answer : d. 16 bit long

Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400bytes? A) 428 B) 407 C) 107 D) 427

Last Answer : 428

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 0111

Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 1110

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above

Last Answer : differentiatedservices

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001

Last Answer : c. 11010110111110

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : Should me computer, router and router range expander all have the same IP Address?

Last Answer : They may not have the same IP address. IP addresses must be unique.

Description : How to find the IP address of the router ?

Last Answer : There may come a time when you need to change your router settings. To do this you may need to enter the IP address of the web browser. But if you do not know what this IP address ... adapter connected to your router. Notably , this is the default Gateway settings that actually address the router.

Description : The least significant 23 bits in a 48-bit Ethernet address identify a ________. A) multicast router B) host C) multicast group D) noneof the above

Last Answer : multicast group

Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address

Last Answer : flow label

Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : host-specific