An ICMP message has _____ headerand a variable-size data section.
A)
a 16-byte
B)
a 32-byte
C)
an 8-byte
D)
noneof the above

1 Answer

Answer :

an 8-byte

Related questions

Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above

Last Answer : query and error reporting messages

Description : ICMP is a _________ layer protocol. A) datalink B) transport C) network D) noneof the above

Last Answer : network

Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated only for the first fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true

Last Answer : An ICMP error message may be generated only for the first fragmen

Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated for each fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true

Last Answer : noneis true

Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol that handles error andcontrol messages

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : ICMP stands for __________ a. Internet Coordinate Message Protocol b. Internet Control Message Protocol c. Interconnect Control Message Protocol d. Interconnect Coordinate Message Protocol

Last Answer : b. Internet Control Message Protocol

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : In IGMP, the general query message ___________________ group. A) doesnot define a particular B) explicitly defines a C) candefine more thanone D) noneof the above

Last Answer : doesnot define a particular

Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above

Last Answer : two membership reports are

Description : A multicast message is sent from _______ to _______. A) onesource; one destination B) onesource; multiple destinations C) multiple sources; onedestination D) noneof the above

Last Answer : onesource; multiple destinations

Description : The _______ field of the IGMP message is all zeros in a query message. A) version B) type C) group address D) noneof the above

Last Answer : group address

Description : The _______ is used by a router in response to a received leave report. A) general query message B) special query message C) membershipreport D) noneof the above

Last Answer : special query message

Description : A 32 bit microprocessor has the word length equal to a. 2 byte b. 32 byte c. 4 byte d. 8 byte

Last Answer : 4 byte

Description : Because we wish to allow each ASCII code to occupy one location in memory, most memories are _____ addressable. a. BYTE b. NIBBLE c. WORD (16 bits) d. DOUBLEWORD (32 bits)

Last Answer : a. BYTE

Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit

Last Answer : C. 8-bit

Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit

Last Answer : c. 16 bit

Description : The IPv4header size _______. A) is 20 to 60 bytes long B) is 20 bytes long C) is 60 bytes long D) noneof the above

Last Answer : is 20 to 60 bytes long

Description : The ASCII encoding of binary data is called a. base 64 encoding b. base 32 encoding c. base 16 encoding d. base 8 encoding

Last Answer : a. base 64 encoding

Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov

Last Answer : baseheader;upper-layer data

Description : What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields? a. 1 byte b. 1 bit c. 4 bit d. 16 bit

Last Answer : a. 1 byte

Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3

Last Answer : 1

Description : What is the size of an IP address? A. 64 bit B. 128 bit C. 16 bit D. 32 bit

Last Answer : D. 32 bit

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : ICMP is primarily used for __________ a. error and diagnostic functions b. addressing c. forwarding d. routing

Last Answer : a. error and diagnostic functions

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : Define ICMP.

Last Answer : Internet Control Message Protocol is a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully.

Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800

Last Answer : the first byteof the datagram is byte800

Description : The number of characters that can be stored in given physical space is a. Word length b. Byte c. Data density d. Field

Last Answer : Data density

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity

Last Answer : b. Flow control

Description : Which quantizationlevel results ina more faithful reproduction of the signal? A) 2 B) 8 C) 16 D) 32

Last Answer : 32

Description : An IPv6address can haveup to __________ hexadecimal digits. A) 16 B) 32 C) 8 D) none of the above

Last Answer : 32

Description : An organization isgranteda block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 16

Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.128/29. How manyaddressesare granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 8

Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.64/28. How manyaddresses are granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 16

Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long

Last Answer : D. 16 bit long

Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long

Last Answer : d. 16 bit long

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above

Last Answer : priority

Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above

Last Answer : more

Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above

Last Answer : differentiatedservices

Description : In IPv4, when a datagram is encapsulated in a frame, the total sizeof the datagram must beless thanthe _______. A) MUT B) MAT C) MTU D) noneof the above

Last Answer : MTU