The metric usedby _______ is the hopcount.
A)
OSPF
B)
RIP
C)
BGP
D)
none of the above

1 Answer

Answer :

RIP

Related questions

Description : ________ is an interdomain routingprotocol using path vector routing. A) BGP B) RIP C) OSPF D) none of the above

Last Answer : BGP

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : In OSPF, a _______ link is a network with several routersattachedto it. A) point-to-point B) transient C) stub D) none of the above

Last Answer : transient

Description : The Open Shortest Path First (OSPF)protocol is an intradomain routing protocolbased on _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : . In IPv6, the___________ address isgenerally usedby a normal host as a unicast address. A) provider-based unicast B) link local C) site local D) none of the above

Last Answer : provider-based unicast

Description : To create a neighborhood relationship,a router running BGP sends an ________ message. A) open B) update C) keepalive D) none of the above

Last Answer : open

Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above

Last Answer : DVMRP

Description : In OSPF, when the link between two routers is broken, the administration may create a _________ link between them usinga longer paththat probably goes throughseveral routers. A) point-to-point B) transient C) stub D) none of the above

Last Answer : none of the above

Description : In OSPF, a ________ link is a network is connectedto only one router. A) point-to-point B) transient C) stub D) none of the above

Last Answer : stub

Description : In OSPF, a ________ link connects two routers without anyother host or router in between. A) point-to-point B) transient C) stub D) none of the above

Last Answer : point-to-point

Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : OSPF

Description : DVMRP is a ________routing protocol,based on RIP. A) source-based B) group-shared C) both a and b D) none of the above

Last Answer : source-based

Description : The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : distancevector

Description : RIP stands for ________ a. Reduced Information Protocol b. Routing Internet Protocol c. Routing Information Protocol d. Reduced Internet Protocol

Last Answer : c. Routing Information Protocol

Description : List four types of computers that are designed for use by organization, and are commonly usedby multiple people at the same time. List the types of computers that are designed for use by asingle person. How a footnote differs from an endnote?

Last Answer : supercomputers, mainframe computers and servers. Multiprocessor and multi-core (multiple CPUs on a single integrated circuit) personal and laptop computers are now widely available, and are being ... at once. Supercomputers usually see usage in large-scale simulation, graphics rendering, and crypt

Description : Which of the following is not a process metric ? Productivity Functionality Quality Efficiency

Last Answer : Functionality

Description : What is the full form of BGP ?

Last Answer : The full form of BGP is Bangladesh Govt. Press.

Last Answer : BGP's full form Bharatiya Janata Party

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11

Last Answer : 01

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

Last Answer : IEEE 802.11

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above

Last Answer : data link

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : A _______ is a device that operates only in the physical layer A) passive hub B) repeater C) bridge D) router

Last Answer : repeater

Description : _______ ispart of the media; its location in the Internet model is below thephysical layer. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : A _______ is a connecting devicethat operates in the physical and data link layers of theInternet model. A) repeater B) bridge C) router D) none of the above

Last Answer : bridge

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above

Last Answer : Framing

Description : HDLC isan acronym for _______. A) High-duplex line communication B) High-leveldata link control C) Half-duplex digital link combination D) Hostdouble-level circuit

Last Answer : High-leveldata link control

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above

Last Answer : exactly 10

Description : ARQ stands for _______. A) Automatic repeatquantization B) Automatic repeat request C) Automatic retransmissionrequest D) Acknowledge repeat request

Last Answer : Automatic repeat request

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : _______ control refers to aset of proceduresused torestrict the amount ofdata that the sender can send before waiting foracknowledgment. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Flow

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : The _______ of a polynomial is the highest power in the polynomial. A) range B) degree C) power D) none of the above

Last Answer : degree

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : The HFC network uses _______ cable. A) twisted-pair B) coaxial C) fiber-optic D) acombination of (b) and (c)

Last Answer : fiber-optic