Description : In OSPF, a ________ link is a network is connectedto only one router. A) point-to-point B) transient C) stub D) none of the above
Last Answer : stub
Description : In OSPF, when the link between two routers is broken, the administration may create a _________ link between them usinga longer paththat probably goes throughseveral routers. A) point-to-point B) transient C) stub D) none of the above
Last Answer : none of the above
Description : In OSPF, a _______ link is a network with several routersattachedto it. A) point-to-point B) transient C) stub D) none of the above
Last Answer : transient
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above
Last Answer : link state
Description : The Open Shortest Path First (OSPF)protocol is an intradomain routing protocolbased on _______ routing. A) distancevector B) link state C) path vector D) none of the above
Description : ________ is an interdomain routingprotocol using path vector routing. A) BGP B) RIP C) OSPF D) none of the above
Last Answer : BGP
Description : The least significant 23 bits in a 48-bit Ethernet address identify a ________. A) multicast router B) host C) multicast group D) noneof the above
Last Answer : multicast group
Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true
Last Answer : D. 1. true, 2. false, 3. true
Description : In the group-shared tree approach,_________ involved in multicasting. A) only the core router is B) all routers are C) only some routers are D) none of the above
Last Answer : only the core router is
Description : The inputand output portsof a router perform the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above
Last Answer : physical and data link
Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers
Last Answer : IMPs
Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree
Last Answer : a. spanning tree
Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Last Answer : A. spanning tree
Description : The metric usedby _______ is the hopcount. A) OSPF B) RIP C) BGP D) none of the above
Last Answer : RIP
Description : An IGMP query is sent from a _______to a _______. A) host; host B) host; router C) router; hostor router D) noneof the above
Last Answer : router; hostor router
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above
Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect
Last Answer : b. Communication Administratively Prohibited
Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729
Last Answer : 729
Description : In a ________ connection, three or more devices share a link. A) multipoint B) point-to-point C) (a) and(b) D) none of the above
Last Answer : multipoint
Description : Three or more devices share a link in ________ connection. a) Unipoint b) Multipoint c) Point to point d) Simplex
Last Answer : b) Multipoint
Description : A ________operates in both thephysical andthe data link layer. A) passive hub B) repeater C) bridge D) router
Last Answer : bridge
Description : A _______ is a connecting devicethat operates in the physical and data link layers of theInternet model. A) repeater B) bridge C) router D) none of the above
Description : The layer one of the OSI model is A) Physical layer B) Link layer C) Router layer D) Broadcast layer
Last Answer : A) Physical layer
Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13
Last Answer : d. 13
Description : IGMP helps a ________ router createand update a list of loyal members relatedto each router interface. A) broadcast B) unicast C) multicast D) noneof the above
Last Answer : multicast
Description : To create a neighborhood relationship,a router running BGP sends an ________ message. A) open B) update C) keepalive D) none of the above
Last Answer : open
Description : Data link control deals withthe design and procedures for ______communication. A) node-to-node B) host-to-host C) process-to-process D) none of the above
Last Answer : node-to-node
Description : . In IPv6, the___________ address isgenerally usedby a normal host as a unicast address. A) provider-based unicast B) link local C) site local D) none of the above
Last Answer : provider-based unicast
Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223
Last Answer : a. 158
Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP
Last Answer : C. port
Description : Coding A Theme For Tumblr Is The Same As Coding AnyOther Blog Right?
Last Answer : i didnt mispelled anything tho
Description : Can I hook up two wireless routers on the same cable line; one at one end of the house and the other at the other end of the house. I presently have a router at one end but my computer at the other end of the house is extremely slow and needs a lift Any?
Last Answer : Can I hook up two wireless routers on the same cable line?
Description : When replacing a wireless router can you use the old routers wep Key, etc.?
Last Answer : Absolutely… this way, your users don’t have to re-enter the security settings… it will be seamless to them. Just make sure you use the same SSID and IP address for the Gateway (wireless) router
Description : Why are all wireless router companies locking their routers by default now?
Last Answer : I live in the twin cites any where in the cites they have wifi
Description : A devicethat connects toa network without the useof cables is said to be– (A) distributed (B) free (C) centralized (D) open source (E) None of these
Last Answer : free
Description : __________ is agroup ofnetworksand routers under theauthorityof a singleadministration. A) An autonomous system B) An area C) a and b D) none of the above
Last Answer : An autonomous system
Description : When data moves from one set of major connections to another on theInternet, we call theseconnections the Internet _____. A) Pathway B) Backbone C) Communications system D) Routers
Last Answer : Backbone
Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above
Last Answer : d. All of the above
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : What are called routers? a. The devices that operates at session layer b. The devices that operates at data layer c. The devices that operates at application layer d. The devices that operates at network
Last Answer : d. The devices that operates at network
Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches
Last Answer : d. Routers, Bridges and Switches
Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above
Last Answer : B. queues
Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls
Last Answer : B. Unix
Description : In ________ routing, we assume that there is one node (or more) ineach autonomous system that acts on behalf of the entire autonomous system. A) distant vector B) path vector C) link state D) none of the above
Last Answer : path vector
Description : In ________, eachnode maintains avector (table)of minimum distances to every node. A) path vector B) distancevector C) link state D) none of the above
Last Answer : distancevector
Description : The routing processor of arouter performs the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above
Last Answer : network