Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned
Last Answer : C. Port
Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length
Last Answer : b. Source address
Description : A browser uses the DNS system to convert a domain name into an ip address. But once it has the the ip address how does it know where the server is located and reach the server to download the site?
Last Answer : The point of an ip address is that each one is unique. It’s not unlike an address on an envelope. How does the mail know where to go? There is only one possibility.
Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address
Last Answer : Finding the MAC address that corresponds to an IP address
Description : …………………………………. converts a physical network address into an IP address. A. ARP B. RARP C. DNS D. DHCP
Last Answer : B. RARP
Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? a. Resolver b. Mapper c. Primary Server d. Secondary Server
Last Answer : a. Resolver
Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? A. Resolver B. Mapper C. Primary Server D. Secondary Server
Last Answer : A. Resolver
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number
Last Answer : d. Destination port number
Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long
Last Answer : D. 16 bit long
Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long
Last Answer : d. 16 bit long
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : hedestination IP address in the datagram header
Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default
Last Answer : host-specific
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : address use 7 bits for the and 24 bits for the portion of the IP a. address. b. Class A c. Class B d. Class C e. Class D
Last Answer : a. address.
Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223
Last Answer : a. 158
Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address
Last Answer : c. network address & host address
Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address
Last Answer : C. network address & host address
Description : Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address
Last Answer : c) port address
Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3
Last Answer : a. 4,2,1,3
Description : A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file. A. domain, particular B. Class, particular C. tree, local D. Domain, every
Last Answer : A. domain, particular
Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems
Last Answer : A. Host names and IP addresses
Description : The ____ namespace is based on a hierarchical and logical tree structure A. DNS B. Address C. table D. both a and b
Last Answer : A. DNS
Description : SMTP is based on …………………………………..delivary, contacts on well known port number…………………………… A. host to host, 23 B. host to host, 25 C. end to end , 23 D. end to end, 80
Last Answer : B. host to host, 25
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Last Answer : all of theabove
Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above
Last Answer : IP
Description : The function of IP adress is …………………………………………. A. host identification B. network interface identification C. location addressing D. all of the above
Last Answer : D. all of the above
Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application
Last Answer : b. Host to host
Description : The combination of an IP address and a port number is known as ................... (A) network number (B) socket address (C) subnet mask number (D) MAC address
Last Answer : (B) socket address
Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical
Last Answer : (A) Port
Description : State whether the following statements are true / false: 1) A fully qualified domain name starts with a specific host and ends with a top-level domain. 2) Domain names are always written as fully qualified domain names. A. 1.T, 2.T B. 1.T, 2.F C. 1.F, 2.T D. 1.F, 2.F
Last Answer : B. 1.T, 2.F
Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP
Last Answer : C. port
Description : The statement, "In regions where fluid velocity is smaller, the pressure is higher, and vice versa", is known as the principle of: w) Pascal x) Bernoulli y) Torricelli z) Archimedes
Last Answer : ANSWER: X -- BERNOULLI
Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 0111
Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 1110
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation
Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size
Last Answer : b. Fragment offset
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum