Description : The limited capability of this routing table is easily verified with the ………………………... command. A. ping B. traceroute C. route D. netstat
Last Answer : A. ping
Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger
Last Answer : C. ifconfig
Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger
Last Answer : C. make config
Description : A ________ switch is a multistageswitch with microswitches at each stagethat route the packets based on theoutput port representedas a binary string. A) crossbar B) TSI C) banyan D) none of the above
Last Answer : banyan
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : ------------------- is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. a. Interface b. Reference model c. Protocol d. None of these
Last Answer : c. Protocol
Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b
Last Answer : A. static routing table
Description : What would be the proper command to set a DCE clock rate of 56k for a serial interface? A. Router (config) # clockrate 56000 B. Router# clockrate 56000. C. Router (config-if) #clock rate 56000 D. Router (config-if) # clockrate 56k
Last Answer : Router (config-if) #clock rate 56000
Description : The……………………command can determine which interface is used on a system from the messages displayed on the console during a boot. A. dmesg B. traceroute C. ifconfig D. finger
Last Answer : A. dmesg
Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register
Last Answer : Memory
Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D
Last Answer : b. A,B,C
Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect
Last Answer : c.ping
Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.
Last Answer : Aux Port
Description : Data communications monitors available on the software marked include a. ENVIRON/1 b. TOTAL c. BPL d. Telnet
Last Answer : ENVIRON/1
Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these
Last Answer : Telnet
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP
Last Answer : A) Telnet
Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP
Last Answer : d. SMTP
Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP
Last Answer : a. HTTP, FTP
Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP
Last Answer : c.Telnet
Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer
Last Answer : d. Application layer
Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP
Last Answer : c. DNS
Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet
Last Answer : A. DNS
Description : Explain about telnet.
Last Answer : Remote terminal protocol. It allows to interact with a remote system as if terminal is directly connected to that machine. - working procedure - applications
Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above
Last Answer : hot potatorouting
Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B
Last Answer : a. A & B
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above
Last Answer : Down through thelayers of the IP architecture and then up thelayers again
Description : The program used to determine the round trip delay between a workstation and a destination address is a. Tracert b. Traceroute c. Ping d. Pop
Last Answer : b. Traceroute
Description : Trace the origin of Silk Route and its significance. -SST 10th
Last Answer : The Silk Route is one of the world's oldest and historically most important trade route which affected the cultures of China, Central Asia and the West. It had many branches leading to different ... only one of the many commodities that was traded between China and the world through this route.
Description : For preparation of a contour plan for a route survey (A) Method of squares is used (B) Method of trace contour is used (C) Method of cross profile is used (D) Indirect method of contouring is used
Last Answer : (C) Method of cross profile is used
Description : Pick up the correct statement from the following: (A) During reconnaissance, the general route of the alignment is selected (B) After reconnaissance, a trace is cut for the alignment (C) Last stage is the detailed surveys for desired geometries' of the highway (D) All the above
Last Answer : Answer: Option D
Description : Which of the following condition is usedto transmit two packets overa medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above
Last Answer : Collision
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above
Last Answer : exactly 10
Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL5
Description : In ATM,_______is for short packets. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL2
Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove
Last Answer : ATM
Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above
Last Answer : in the early 1960s for military communication systems, mainly to handle speech
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following system calls results in the sending of SYN packets? a. socket b. bind c. listen d. connect
Last Answer : d. connect
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : Packets will be transferred in how many types? a. 5 types b. 4 types c. 2 types d. 3 types
Last Answer : d. 3 types
Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges
Last Answer : a. Host
Description : Which of the following is not correct in relation to multi-destination routing? a. is same as broadcast routing b. contains the list of all destinations c. data is not sent by packets d. there are multiple receivers
Last Answer : c. data is not sent by packets
Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes
Last Answer : c. packets