Membership in a VLAN can be based on _________.
A)
port numbers
B)
MAC addresses
C)
IP addresses
D)
all of theabove

1 Answer

Answer :

all of theabove

Related questions

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above

Last Answer : IP

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : A virtual local areanetwork (VLAN) is configured by _________. A) software B) physical wiring C) hardware D) none of the abov

Last Answer : software

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned

Last Answer : C. Port

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : A SONET system can use _________. A) STS multiplexers B) regenerators C) add/drop multiplexers D) all of theabove

Last Answer : add/drop multiplexers

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node

Last Answer : b. Network.Network.Node.Node

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : Is it possible to block all traffic on a certain port except to two IP addresses?

Last Answer : It depends upon how flexible your router is. Use the router firmware to set this up. If your firmware isn’t sophisticated enough, try to find something like DWT or another good third-party router firmware program to update the one you have.

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long

Last Answer : D. 16 bit long

Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long

Last Answer : d. 16 bit long

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : IP is _________ datagram protocol. A) an unreliable B) a connectionless C) botha and b D) noneof the above

Last Answer : botha and b

Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address

Last Answer : Finding the MAC address that corresponds to an IP address

Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address

Last Answer : c. network address & host address

Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address

Last Answer : D. IP address

Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address

Last Answer : C. network address & host address

Description : The combination of an IP address and a port number is known as ................... (A) network number (B) socket address (C) subnet mask number (D) MAC address

Last Answer : (B) socket address

Description : Which is not the Regional Internet Registers (RIR) of the following? a. American Registry for Internet Numbers (ARIN) b. Europeans Registry for Internet Numbers (ERIN) c. Reseaux IP Europeans (RIPE) d. Asia Pacific Network

Last Answer : b. Europeans Registry for Internet Numbers (ERIN)

Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : unicast

Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : multicast

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : polar

Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : unipolar

Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove

Last Answer : All of theabove

Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove

Last Answer : ring

Description : In ATM, connection between two endpoints is accomplishedthrough_______. A) TPs B) VPs C) VCs D) all of theabove

Last Answer : all of theabove

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM

Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above

Last Answer : Modify

Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above

Last Answer : databaseaccessplanning

Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above

Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace

Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT SUB FROM BOOK

Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT

Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above

Last Answer : You needto understand the model the record management system uses.

Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : can use aggregatefunctions like SUM and COUNT