The _______ protocol allows the administrator toassign acost, called the metric, to each route.
A)
OSPF
B)
RIP
C)
BGP
D)
none of the above

1 Answer

Answer :

OSPF

Related questions

Description : Routes are built automatically by………………….., manually by the system administrator, or dynamically by routing protocols. A. route B. traceroute C. ifconfig D. netstat

Last Answer : C. ifconfig

Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : A. static routing table

Description : The metric usedby _______ is the hopcount. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : RIP

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

Last Answer : Modem

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the telephone network and ………………..uses a proposed international standard for transmitting HDLC over asynchronous lines. A. LCP, PPP B. PPP, LCP C. SLIP, PPP D. PPP, SLIP

Last Answer : C. SLIP, PPP

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : _______ isa dynamic mapping protocol in which a physical address is found for agiven logicaladdress. A) ARP B) RARP C) botha and b D) noneof the above

Last Answer : ARP

Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above

Last Answer : DVMRP

Description : MOSPF is a _______ protocol. A) data-driven B) command-driven C) both a and b D) none of the above

Last Answer : data-driven

Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : The Open Shortest Path First (OSPF)protocol is an intradomain routing protocolbased on _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : _______ is the protocol suite for thecurrent Internet. A) TCP/IP B) NCP C) UNIX D) ACM

Last Answer : TCP/IP

Description : The _______ is thephysicalpath over which a message travels. A) Protocol B) Medium C) Signal D) All the above

Last Answer : Medium

Description : The _______ is a unidirectional protocol that has no flow or error control. A. Simplest B. Simplex C. TCP/IP protocol D. Simplest or Simplex

Last Answer : D. Simplest or Simplex

Description : The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology A. layer 1 B. layer 4 C. layer 2 D. layer 3

Last Answer : C. layer 2

Description : The maximum size of the window in a Sliding Window Protocol is _______ A. 2m – 1 B. 2m + 1 C. 2m D. 2m-1

Last Answer : A. 2m – 1

Description : The _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. A. ARP B. RARP C. both a and b D. none of the above

Last Answer : B. RARP

Description : In Frame Relay, when a _____ is selected, the correspondingtable entry is recorded for all switches by the administrator A) PVC B) SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PVC

Description : Which of the following is not a process metric ? Productivity Functionality Quality Efficiency

Last Answer : Functionality

Description : A ________ switch is a multistageswitch with microswitches at each stagethat route the packets based on theoutput port representedas a binary string. A) crossbar B) TSI C) banyan D) none of the above

Last Answer : banyan

Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above

Last Answer : 100

Description : The Federal Communications Commission (FCC) allows ______kHz for each AM station. A) 5 B) 10 C) 20 D) none of the above

Last Answer : 0

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : The limited capability of this routing table is easily verified with the ………………………... command. A. ping B. traceroute C. route D. netstat

Last Answer : A. ping

Description : In datagram subnet new route is chosen ………………… (A) for every packet sent (B) for first and last packet sent (C) only for the first packet (D) for the packet which is not transmitted

Last Answer : (A) for every packet sent

Description : It will be the _______ duty to prepare and prescribe ____(M-53) indicating the beats of the ____attached to each head, ____in his sub-division(Including first class head offices) a) Supdt, route ... Inspector's, route lists and beat maps, village postmen, sub and branch office d) None of these

Last Answer : c) Inspector’s, route lists and beat maps, village postmen, sub and branch office

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system

Last Answer : b) protocol stack

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : State whether the following statements are true/false: 1) The standards of TCP/IP are published in a series of documents called NFC. 2) A Protocol is an agreement between the communicating parties on how communication is to proceed. a. 1.F,2.T b. 1.F, 2.F c. 1.T, 2.T d. 1.T, 2.F

Last Answer : a. 1.F,2.T

Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer

Last Answer : Buffer

Description : Which of the following memories allows simultaneous read and write operations? a. ROM b. RAM c. EPROM d. None of above

Last Answer : RAM

Description : What type of network device allows youto share your connection to the Internet with other computers in your home? A) Ethernet card B) NIC C) Router D) Cat 5

Last Answer : Router

Description : In _________, autonegotiation allows two devices to negotiate the mode or datarate of operation. A) Standard B) Fast Ethernet C) Gigabit Ethernet D) Ten-Gigabit Ethernet

Last Answer : Fast Ethernet

Description : A _______LAN allows several LANs to be connected. A) backbone B) wireless C) wired D) none of the above

Last Answer : backbone

Description : _____ isa digitalprocess that allows several connections to share thehighbandwidth ofa link. A) FDM B) TDM C) WDM D) None of the above

Last Answer : TDM

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above

Last Answer : more

Description : In Excel“““.allows users to bring together copiesof work-books that otherusers have worked on independently. (A) Copying (B) Merging (C) Pasting (D) Compiling (E) None of these

Last Answer : Merging