RPB guarantees that eachdestinationreceives _________ of the packet.
A)
one copy
B)
no copies
C)
multiplecopies
D)
none of the above

1 Answer

Answer :

one copy

Related questions

Description : RPF guarantees that eachnetwork receives only ____ of the multicast packet. A) one copy B) two copies C) a or b D) none of the above

Last Answer : none of the above

Description : . If there is only one station with a packet to send, this guarantees that there will ………….. For that packet. A. never be a collision B. be a collision C. be an improvement D. direction

Last Answer : A. never be a collision

Description : Pruning and grafting are strategiesused in _______. A) RPF B) RPB C) RPM D) none of the above

Last Answer : RPM

Description : ______ adds pruning and grafting to_______ to create a multicast shortestpath tree that supports dynamic membershipchanges. A) RPM; RPB B) RPB; RPM C) RPF: RPM D) none of the above

Last Answer : RPM; RPB

Description : In ________, the multicastpacket must reach only those networks that haveactive members for thatparticular group. A) RPF B) RPB C) RPM D) none of the above

Last Answer : RPM

Description : RPB creates a shortest path _______ tree from thesourceto each destination. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth

Last Answer : A. Reliability

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : The ________ modeprovides synchronizationfor the entire stream of bits must. In other words, it guarantees that the data arrive ata fixed rate. A) synchronous B) asynchronous C) isochronous D) none of the above

Last Answer : isochronous

Description : Can I copy 80 year old family photos I have no information on who took the photos but they look professional. I am trying to make copies for my kids.?

Last Answer : You can if the photographer died since more then 70 years. If so, they are now in the public domain so you can freely use them.

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : The“““.folder retains copies of messages that you have started but are not yet ready to send. (A) Drafts (B) Outbox (C) Address Book (D) Sent Items (E) Inbox

Last Answer : Outbox

Description : What A copy machine makes 40 copies in 5 minutes. How many minutes will it take to make 100 copies?

Last Answer : A math question

Description : If an owner of a copy center is interested in knowing which of her employees can make the most copies in a hour she wants to understand?

Last Answer : which employee has the absolute advantage in making copies. grad-point

Description : The proceedings of the legislature may be proved by (a) Oral evidence (b) Copy of such proceedings (c) The journals of those bodies or by published Acts or abstracts or by  copies purporting to be printed by order of the Government concerned (d) None of these

Last Answer : (c) The journals of those bodies or by published Acts or abstracts or by  copies purporting to be printed by order of the Government concerned

Description : Secondary evidence means a) Certified copies given under provisions hereinafter contained b) Copies made from the original by mechanical processes which in themselves  insure accuracy of copy  c) Copies ... of documents as against the parties who did not execute them e) All the above

Last Answer : e) All the above

Description : The copies of the newspaper without prepayment will be handed over to window along with an invoice which should be a) In triplicate b) In duplicate c) In quadruplicate d Single copy

Last Answer : b) In duplicate

Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.

Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched

Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above

Last Answer : four

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : The ATM data packet is acell composed of ______bytes. A) 40 B) 50 C) 52 D) 53

Last Answer : 53

Description : A _______is defined as a small, fixed-size block of information. A) frame B) packet C) cell D) none of the above

Last Answer : cell

Description : Which of the following is anecessary part of the IPv6 datagram? A) Base header B) Extension header C) Data packet from the upper layer D) (a) and (c)

Last Answer : Base header

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : An IGMP packet is carried in an __________ packet. A) UDP B) IP C) Ethernet frame D) noneof the above

Last Answer : IP

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : In _______, the router may forwardthereceived packet through several of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above

Last Answer : multicasting

Description : In ______, the router forwards thereceived packet through only one of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above

Last Answer : unicasting

Description : The taskof moving the packet from theinput queue to the output queuein a router is done by_________. A) input and output ports B) routing processor C) switching fabrics D) none of the above

Last Answer : switching fabrics

Description : In _______delivery, the deliverer of theIP packet and the destination are on different networks. A) aconnection-oriented B) a direct C) an indirect D) none of the above

Last Answer : an indirect

Description : In _______delivery, both thedeliverer of the IP packet and the destination are on the same network. A) aconnectionless B) a direct C) an indirect D) none of the above

Last Answer : a direct

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : In the OSI model, as a data packet moves from the lower to the upper layers, headers are a. Added b. Removed c. Rearranged d. Randomized

Last Answer : b. Removed

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way