Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above
Last Answer : query and error reporting messages
Description : ICMP is a _________ layer protocol. A) datalink B) transport C) network D) noneof the above
Last Answer : network
Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated only for the first fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true
Last Answer : An ICMP error message may be generated only for the first fragmen
Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated for each fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true
Last Answer : noneis true
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D
Last Answer : a. A & B
Description : ICMP stands for __________ a. Internet Coordinate Message Protocol b. Internet Control Message Protocol c. Interconnect Control Message Protocol d. Interconnect Coordinate Message Protocol
Last Answer : b. Internet Control Message Protocol
Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320
Last Answer : b. 40
Description : In IGMP, the general query message ___________________ group. A) doesnot define a particular B) explicitly defines a C) candefine more thanone D) noneof the above
Last Answer : doesnot define a particular
Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above
Last Answer : two membership reports are
Description : A multicast message is sent from _______ to _______. A) onesource; one destination B) onesource; multiple destinations C) multiple sources; onedestination D) noneof the above
Last Answer : onesource; multiple destinations
Description : The _______ field of the IGMP message is all zeros in a query message. A) version B) type C) group address D) noneof the above
Last Answer : group address
Description : The _______ is used by a router in response to a received leave report. A) general query message B) special query message C) membershipreport D) noneof the above
Last Answer : special query message
Description : A 32 bit microprocessor has the word length equal to a. 2 byte b. 32 byte c. 4 byte d. 8 byte
Last Answer : 4 byte
Description : Because we wish to allow each ASCII code to occupy one location in memory, most memories are _____ addressable. a. BYTE b. NIBBLE c. WORD (16 bits) d. DOUBLEWORD (32 bits)
Last Answer : a. BYTE
Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit
Last Answer : C. 8-bit
Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB
Last Answer : (C) 16 GB
Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above
Last Answer : 48-b
Description : What is the size of the ‘total length’ field in IPv4 datagram? a. 4 bit b. 8 bit c. 16 bit d. 32 bit
Last Answer : c. 16 bit
Description : The IPv4header size _______. A) is 20 to 60 bytes long B) is 20 bytes long C) is 60 bytes long D) noneof the above
Last Answer : is 20 to 60 bytes long
Description : The ASCII encoding of binary data is called a. base 64 encoding b. base 32 encoding c. base 16 encoding d. base 8 encoding
Last Answer : a. base 64 encoding
Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov
Last Answer : baseheader;upper-layer data
Description : What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields? a. 1 byte b. 1 bit c. 4 bit d. 16 bit
Last Answer : a. 1 byte
Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3
Last Answer : 1
Description : What is the size of an IP address? A. 64 bit B. 128 bit C. 16 bit D. 32 bit
Last Answer : D. 32 bit
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect
Last Answer : b. Communication Administratively Prohibited
Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above
Last Answer : c. Checksum
Description : ICMP is primarily used for __________ a. error and diagnostic functions b. addressing c. forwarding d. routing
Last Answer : a. error and diagnostic functions
Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP
Last Answer : c. ARP
Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : B. 1. true, 2. false, 3.true
Description : Define ICMP.
Last Answer : Internet Control Message Protocol is a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully.
Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800
Last Answer : the first byteof the datagram is byte800
Description : The number of characters that can be stored in given physical space is a. Word length b. Byte c. Data density d. Field
Last Answer : Data density
Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : bit-oriented
Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control
Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity
Last Answer : b. Flow control
Description : Which quantizationlevel results ina more faithful reproduction of the signal? A) 2 B) 8 C) 16 D) 32
Last Answer : 32
Description : An IPv6address can haveup to __________ hexadecimal digits. A) 16 B) 32 C) 8 D) none of the above
Description : An organization isgranteda block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted? A) 8 B) 16 C) 32 D) none of the above
Last Answer : 16
Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.128/29. How manyaddressesare granted? A) 8 B) 16 C) 32 D) none of the above
Last Answer : 8
Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.64/28. How manyaddresses are granted? A) 8 B) 16 C) 32 D) none of the above
Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long
Last Answer : D. 16 bit long
Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long
Last Answer : d. 16 bit long
Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec
Last Answer : a. 2 sec
Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above
Last Answer : priority
Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above
Last Answer : more
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : In IPv4, when a datagram is encapsulated in a frame, the total sizeof the datagram must beless thanthe _______. A) MUT B) MAT C) MTU D) noneof the above
Last Answer : MTU