The AALis divided into _______ sublayers.
A)
two
B)
three
C)
four
D)
none of the above

1 Answer

Answer :

two

Related questions

Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer

Last Answer : c. Both A and B

Description : What type of immune defensive cell is found in the sublayers of the epidermis? a. Keratinocyte b. Dendritic (Langerhans) cell c. Neutrophil d. Basophil

Last Answer : b. Dendritic (Langerhans) cell

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above

Last Answer : four

Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above

Last Answer : two membership reports are

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : In _______ switching, the paths in thecircuit are separatedfrom one another spatially. A) time-division B) space-division C) two-dimensional D) three-dimensiona

Last Answer : space-division

Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)

Last Answer : A. CSMA/CA

Description : We candivide today's networks into ____ broad categories. A) four B) three C) five D) two

Last Answer : three

Description : In hexadecimal colon notation, a 128-bit address isdivided into _______ sections, each _____hexadecimal digits in length. A) 8: 2 B) 8: 3 C) 8: 4 D) none of the above

Last Answer : 8: 4

Description : The _______ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format. a. network b. presentation c. transport d. data link

Last Answer : b. presentation

Description : The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames A. Data Link B. Physical C. Network D. Session

Last Answer : A. Data Link

Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above

Last Answer : query and error reporting messages

Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : In________, the available bandwidth is divided into frequency bands. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : A ________network is made of a set of switches connected by physical links, in which each link is divided into nchannels. A) line-switched B) frame-switched C) circuit-switched D) none of the above

Last Answer : circuit-switched

Description : In_______encoding, the duration of the bit is divided into twohalves. Thevoltage remains at one level during thefirst half and moves to the other level in the second half. The transition at the middle of the bit ... Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : IEEE 802.1d specification, defines _________criteria for a transparent bridges. A) two B) three C) four D) none of the above

Last Answer : three

Description : A regenerator is a________ device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : four-layer

Description : An add/drop multiplexer isa ______device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : three-layer

Description : An STS multiplexer is a ______ device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : two-layer

Description : The ATM standard defines______ layers. A) two B) three C) four D) five

Last Answer : three

Description : Traditionally, _____ methods of switching have been important. A) four B) three C) five D) six

Last Answer : three

Description : The term modem is a composite word that refers to the two functional entities that make up the device: asignal _______ and a signal _______. A) modulator; demodulator B) demodulator; modulator C) modern;demo D) none of the above

Last Answer : modulator; demodulator

Description : When a beam of light travels through media of two different densities, if theangle of incidence isgreater than the critical angle, _______ occurs. A) reflection B) refraction C) incidence D) criticism

Last Answer : reflection

Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing

Last Answer : multiplexing

Description : An area is _______. A) part of an AS B) composed of at least two ASs C) another term foran AS D) none of the above

Last Answer : part of an AS

Description : . In _______ routing, the least cost routebetween any two nodes is theroute with the minimum distance. A) path vector B) distancevector C) link state D) none of the above

Last Answer : distancevector

Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove

Last Answer : all of theabove

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11

Last Answer : 01

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

Last Answer : IEEE 802.11

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above

Last Answer : data link

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : A _______ is a device that operates only in the physical layer A) passive hub B) repeater C) bridge D) router

Last Answer : repeater

Description : _______ ispart of the media; its location in the Internet model is below thephysical layer. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : A _______ is a connecting devicethat operates in the physical and data link layers of theInternet model. A) repeater B) bridge C) router D) none of the above

Last Answer : bridge

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical