To create a neighborhood relationship,a router running BGP sends an ________ message.
A)
open
B)
update
C)
keepalive
D)
none of the above

1 Answer

Answer :

open

Related questions

Description : ________ is an interdomain routingprotocol using path vector routing. A) BGP B) RIP C) OSPF D) none of the above

Last Answer : BGP

Description : IGMP helps a ________ router createand update a list of loyal members relatedto each router interface. A) broadcast B) unicast C) multicast D) noneof the above

Last Answer : multicast

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : The metric usedby _______ is the hopcount. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : RIP

Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CD

Description : SONET sends ________ frames per second A) 1000 B) 2000 C) 4000 D) 8000

Last Answer : 2000

Description : The _______ is used by a router in response to a received leave report. A) general query message B) special query message C) membershipreport D) noneof the above

Last Answer : special query message

Description : A _______ message tells an upstream router to start sending multicast messages for a specific groupthrough aspecific router. A) weed B) graft C) prune D) none of the above

Last Answer : graft

Description : A _______ message tells an upstream router to stop sending multicast messages for a specific group through aspecific router. A) weed B) graft C) prune D) none of the above

Last Answer : prune

Description : The least significant 23 bits in a 48-bit Ethernet address identify a ________. A) multicast router B) host C) multicast group D) noneof the above

Last Answer : multicast group

Description : In OSPF, a ________ link is a network is connectedto only one router. A) point-to-point B) transient C) stub D) none of the above

Last Answer : stub

Description : In OSPF, a ________ link connects two routers without anyother host or router in between. A) point-to-point B) transient C) stub D) none of the above

Last Answer : point-to-point

Description : The inputand output portsof a router perform the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above

Last Answer : physical and data link

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm

Last Answer : B. Forward error correction

Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned

Last Answer : C. Port

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : Inthe _______method, after thestation finds the line idle it sends or refrainfrom sending based on the outcome ofa random number generator. If the line is busy, it tries again A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : p-persistent

Description : Inthe ________method, a stationthat has a frame tosend senses the line. If the line is idle, it sends immediately. If theline is not idle, it waits a random amount of time and then senses the line again. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : nonpersistent

Description : Inthe _________ method, after the station finds the lineidle, it sends its frame immediately. If the line isnot idle, it continuously senses theline until it finds it idle. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : 1-persistent

Description : Inthe _____ Protocol, the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait

Description : Inthe _____ Protocol, the sender sends its frames oneafter another with noregard to the receiver. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait B) Simplest

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is __________. a. 400 bps b. 800 bps c. 1600 bps d. 3200 bps

Last Answer : d. 3200 bps

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations. A. distributed clock B. synchronized clock C. centralized clock D. Digital clock

Last Answer : C. centralized clock

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : Emulation of ________ through ___________ is notefficientand may create long delays. A) unicasting; multiple unicasting B) multicasting; multiple unicasting C) broadcasting; multicasting D) none of the above

Last Answer : multicasting; multiple unicasting

Description : When wouldn't you reply to a message someone sends you?

Last Answer : I'd never ignore a message. I guess it's the old do unto others thing, for one thing. I'D not want to be ignored. I can only think of one instance on here that I didn't respond to a message. ... an instance where I was fixing to get snarky & I thought it best to just let the matter drop, & I did.

Description : What does it mean when someone sends you an empty text message?

Last Answer : It means they have fat fingers. I would avoid the proposed meeting at all costs.

Description : Which version of Barbie sends a more empowering message to young girls?

Last Answer : Barbie has had many careers over her long lifetime, and many career-oriented Barbie dolls are available. These include a dentist, a doctor, a paratrooper, a teacher and even the US President.

Description : The Indian Parliament is competent to enact law on a State subject if – (1) emergency under Article 352 is in operation (2) all the state Assemblies of the country make such a request (3) the President sends such a message to Parliament (4) None of these

Last Answer : (1) emergency under Article 352 is in operation Explanation: When National emergency 7 under article 352 is in force, the Parliament can make laws on the 66 subjects of the State List (which ... governments can make laws). Also, all money bills are referred to the Parliament for its approval.

Description : A person who sends the message is known as (a) Communitee (b) Receiver (c) Communicator (d) None of the above

Last Answer : (c) Communicator

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : In the classroom, the teacher sends the message either as words or images. The students are really (A) Encoders (B) Decoders (C) Agitators (D) Propagators

Last Answer : (B) Decoders

Description : What is the full form of BGP ?

Last Answer : The full form of BGP is Bangladesh Govt. Press.

Last Answer : BGP's full form Bharatiya Janata Party

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : The dog is a sweet do. He runs all over the neighborhood. I'm afraid for his safety. Is there anything that I can do to get his owners to keep him safe?

Last Answer : We all have neighbors like that. You can try talking to them reasonably. If that doesn't work perhaps a warning from animal control. Read Dealing with Bad Pet Neighbors for more ideas.

Description : The Multicast Open Shortest Path First (MOSPF)protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is basedon _______ routing. A) distancevector B) link state C) path vector D) none of the above

Last Answer : link state

Description : SONET sends ________ frames per second

Last Answer : 8000

Description : Can we update the D-link router firmware manually?

Last Answer : Yes, it is possible by downloading the firmware’s recent version through dlink-router-local.net support website.

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : In SQL, which of the following is not adata definitionlanguagecommands? A. RENAME B. REVOKE C. GRANT D. UPDATE E. None of the above

Last Answer : UPDATE