Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov
Last Answer : site local
Description : In IPv6,a ___________ address is anaddress of 96 bits of zero followed by32 bits of IPv4 address. A) link local B) site local C) mapped D) none of the above
Last Answer : none of the above
Description : In IPv6,a _________address comprises 80 bits of zero, followed by16 bitsof one, followed by the 32-bit IPv4address. A) link local B) site local C) mapped D) none of the above
Last Answer : mapped
Description : . In IPv6, the___________ address isgenerally usedby a normal host as a unicast address. A) provider-based unicast B) link local C) site local D) none of the above
Last Answer : provider-based unicast
Description : _______address is an internetwork address withuniversal jurisdiction. A) physical B) logical C) a and b D) noneof the above
Last Answer : logical
Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above
Last Answer : more
Description : Inthe _________ method, after the station finds the lineidle, it sends its frame immediately. If the line isnot idle, it continuously senses theline until it finds it idle. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above
Last Answer : 1-persistent
Description : In the Ethernet, the _______field is actually added at the physical layer and isnot (formally)part of the frame. A) CRC B) preamble C) address D) none of the above
Last Answer : preamble
Description : Which of the following isnot a valid version of MS Office? A. Office 4 B. Office97 C. Office 98 D. Office2000
Last Answer : Office 98
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above
Last Answer : d. All the above
Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : FRAD
Description : In Bluetooth, the_____layer is roughlyequivalent tothe MAC sublayer in LANs. A) radio B) baseband C) L2CAP D) none of the above
Last Answer : baseband
Description : In SONET, for each byte, the bitsare transmitted ____________. A) from least significant to the most significant B) from most significant tothe least significant C) two at atime D) three at atime
Last Answer : from least significant to the most significant
Description : In classless addressing, the _______ is the varying part (similar tothe hostid). A) suffix B) prefix C) hostid D) none of the above
Last Answer : suffix
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : _____ refers tothe structure or format of the data, meaning the order in which they are presented. A) Semantics B) Syntax C) Timing D) All of theabove
Last Answer : Syntax
Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above
Last Answer : a continuous frequency capableof being modulated or impressed witha second signa
Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above
Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments
Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above
Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time
Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer
Last Answer : d. Application layer
Description : What are the common protocols associated with the network layer? a. Address Resolution Protocol b. Reverse Address Resolution Protocol c. Internet protocol d. Neighbour Discovery Protocol
Last Answer : c. Internet protocol
Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : B. 1. true, 2. false, 3.true
Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC
Last Answer : a) RFC
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : hedestination IP address in the datagram header
Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above
Last Answer : All of the above
Description : In IPv6, the ________ prefix defines the purpose of the address. A) type B) purpose C) both a and b D) none of the above
Last Answer : type
Description : In IPv6,_________addressdefinesagroup of computers. A) aunicast B) a multicast C) an anycast D) none of the above
Last Answer : a multicast
Description : In IPv6,____ address defines a groupof computers with addresses that have thesame prefix. A) aunicast B) a multicast C) an anycast D) none of the above
Last Answer : an anycast
Description : In IPv6,_______ address defines asingle computer. A) aunicast B) a multicast C) an anycast D) none of the above
Last Answer : aunicast
Description : To makeaddresses morereadable, IPv6 specifies____________notation. A) dotted decimal B) hexadecimal colon C) both a and b D) none of the above
Last Answer : hexadecimal colon
Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address
Last Answer : flow label
Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above
Last Answer : priority
Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov
Last Answer : baseheader;upper-layer data
Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen
Last Answer : hoplimit
Description : Which of the following is anecessary part of the IPv6 datagram? A) Base header B) Extension header C) Data packet from the upper layer D) (a) and (c)
Last Answer : Base header
Description : IPv6 does not support which of the following addressing modes? a. unicast addressing b. multicast addressing c. broadcast addressing d. anycast addressing
Last Answer : c. broadcast addressing
Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : In IPv6, _______ address defines a single computer A. a unicast B. a multicast C. an anycast D. none of the above
Last Answer : A. a unicast
Description : An IPv6 address is _________ bits long A. 32 B. 64 C. 128 D. none of the above
Last Answer : C. 128
Description : In IPv6, options are inserted between the _________ and the ___________ data A. base header; extension header B. base header; upper-layer data C. base header; frame header D. none of the above
Last Answer : B. base header; upper-layer data
Description : IPv6 has _______ -bit addresses. A. 32 B. 64 C. 128 D. Variable
Description : Explain IPv6.
Last Answer : _ Internetwork protocol (IP) _ Addresses and routing _ Address space allocation _ Address notation _ Packet format _Auto configuration