Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above
Last Answer : All of the above
Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above
Last Answer : IP
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : A virtual local areanetwork (VLAN) is configured by _________. A) software B) physical wiring C) hardware D) none of the abov
Last Answer : software
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)
Last Answer : b. ARP (Address Resolution Protocol)
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol
Last Answer : B. ARP Address Resolution Protocol
Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned
Last Answer : C. Port
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : A SONET system can use _________. A) STS multiplexers B) regenerators C) add/drop multiplexers D) all of theabove
Last Answer : add/drop multiplexers
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node
Last Answer : b. Network.Network.Node.Node
Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table
Last Answer : C. name space
Description : Is it possible to block all traffic on a certain port except to two IP addresses?
Last Answer : It depends upon how flexible your router is. Use the router firmware to set this up. If your firmware isn’t sophisticated enough, try to find something like DWT or another good third-party router firmware program to update the one you have.
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical
Last Answer : (A) Port
Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above
Last Answer : wirelessLAN
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number
Last Answer : d. Destination port number
Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long
Last Answer : D. 16 bit long
Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long
Last Answer : d. 16 bit long
Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP
Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.
Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route
Last Answer : bridge
Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0
Last Answer : 1
Description : IP is _________ datagram protocol. A) an unreliable B) a connectionless C) botha and b D) noneof the above
Last Answer : botha and b
Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address
Last Answer : Finding the MAC address that corresponds to an IP address
Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address
Last Answer : c. network address & host address
Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address
Last Answer : D. IP address
Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address
Last Answer : C. network address & host address
Description : The combination of an IP address and a port number is known as ................... (A) network number (B) socket address (C) subnet mask number (D) MAC address
Last Answer : (B) socket address
Description : Which is not the Regional Internet Registers (RIR) of the following? a. American Registry for Internet Numbers (ARIN) b. Europeans Registry for Internet Numbers (ERIN) c. Reseaux IP Europeans (RIPE) d. Asia Pacific Network
Last Answer : b. Europeans Registry for Internet Numbers (ERIN)
Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : unicast
Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : multicast
Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove
Last Answer : physical
Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove
Last Answer : 7
Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : polar
Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : unipolar
Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove
Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove
Last Answer : ring
Description : In ATM, connection between two endpoints is accomplishedthrough_______. A) TPs B) VPs C) VCs D) all of theabove
Last Answer : all of theabove
Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove
Last Answer : ATM
Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above
Last Answer : Modify
Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above
Last Answer : databaseaccessplanning
Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above
Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace
Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above
Last Answer : SELECT DISTINCT SUB FROM BOOK
Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above
Last Answer : SELECT DISTINCT
Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above
Last Answer : You needto understand the model the record management system uses.
Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above
Last Answer : can use aggregatefunctions like SUM and COUNT