In _______forwarding, the destinationaddress is anetworkaddress in the routingtable.
A)
next-hop
B)
network-specific
C)
host-specific
D)
default

1 Answer

Answer :

network-specific

Related questions

Description : In _______forwarding, the mask anddestination addresses are both 0.0.0.0 in therouting table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : default

Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : host-specific

Description : In _______forwarding, the routing tableholds the address of just thenext hop instead of complete routeinformation. A) next-hop B) network-specific C) host-specific D) default

Last Answer : next-hop

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above

Last Answer : priority

Description : Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A. 0.0.0.0,0.0.0.1, 0.0.1.1 B. 255.255.255.0, 255.255.0.0,255.0.0.0 C. 255.0.0.0, 255.255.0.0, 255.255.255.0 D. 255.255.0.0, 255.255.255.0,255.255.255.255 E. None of the above

Last Answer : 255.0.0.0, 255.255.0.0, 255.255.255.0

Description : What partof 192.168.10.51 is the Network ID, assuming a default subnet mask? A. 192 B. 192.168.10 C. 0.0.0.5 D. 51 E. None of the above

Last Answer : 192.168.10

Description : What is the default subnet mask for a class C network? A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0 D. 255.255.255.0 E. None of the above

Last Answer : 255.255.255.0

Description : State whether the following statements are true / false: 1) A fully qualified domain name starts with a specific host and ends with a top-level domain. 2) Domain names are always written as fully qualified domain names. A. 1.T, 2.T B. 1.T, 2.F C. 1.F, 2.T D. 1.F, 2.F

Last Answer : B. 1.T, 2.F

Description : Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address

Last Answer : c) port address

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : You havea class A network address 10.0.0.0 with 40subnets,but arerequiredto add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should youassign? A. ... B. 255.248.0.0 C. 255.252.0.0 D. 255.254.0.0 E. 255.255.255.255

Last Answer : 255.254.0.0

Description : address use 7 bits for the and 24 bits for the portion of the IP a. address. b. Class A c. Class B d. Class C e. Class D

Last Answer : a. address.

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address

Last Answer : c. network address & host address

Description : The function of IP adress is …………………………………………. A. host identification B. network interface identification C. location addressing D. all of the above

Last Answer : D. all of the above

Description : . In addresses for _______ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host. A. class A B. class C C. class B D. class D

Last Answer : C. class B

Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address

Last Answer : C. network address & host address

Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application

Last Answer : b. Host to host

Description : What is the default mask for class C in CIDR notation? A) /24 B) /8 C) /16 D) none of the above

Last Answer : /8

Description : What is the default mask for class B in CIDR notation? A) /9 B) /8 C) /16 D) none of the above

Last Answer : (C) /16

Description : What is the default mask for class A in CIDR notation? A) /9 B) /8 C) /16 D) none of the above

Last Answer : /8

Description : The default view in Excel is“““.view. (A) Work (B) Auto (C) Normal (D) Roman (E) None of these

Last Answer : Normal

Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address

Last Answer : Finding the MAC address that corresponds to an IP address

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer

Last Answer : a. data link layer

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : Data link control deals withthe design and procedures for ______communication. A) node-to-node B) host-to-host C) process-to-process D) none of the above

Last Answer : node-to-node

Description : . In IPv6, the___________ address isgenerally usedby a normal host as a unicast address. A) provider-based unicast B) link local C) site local D) none of the above

Last Answer : provider-based unicast

Description : The least significant 23 bits in a 48-bit Ethernet address identify a ________. A) multicast router B) host C) multicast group D) noneof the above

Last Answer : multicast group

Description : An IGMP query is sent from a _______to a _______. A) host; host B) host; router C) router; hostor router D) noneof the above

Last Answer : router; hostor router

Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : In OSPF, a ________ link connects two routers without anyother host or router in between. A) point-to-point B) transient C) stub D) none of the above

Last Answer : point-to-point

Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers

Last Answer : IMPs

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? a. Resolver b. Mapper c. Primary Server d. Secondary Server

Last Answer : a. Resolver

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? a. 62 subnets and 262142 hosts. b. 64 subnets and 262142 hosts. c. 62 subnets and 1022 hosts. d. 64 subnets and 1024 hosts

Last Answer : c. 62 subnets and 1022 hosts.

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : There are 10 users plugged into a hub running 10Mbps half-duplex.and a server connected to the switch running 10Mbps half- duplex as well. Find the bandwidth does each host have to the server? a. 100 kbps b. 1 Mbps c. 2 Mbps d. 10 Mbps

Last Answer : d. 10 Mbps

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : SMTP is based on …………………………………..delivary, contacts on well known port number…………………………… A. host to host, 23 B. host to host, 25 C. end to end , 23 D. end to end, 80

Last Answer : B. host to host, 25