Home
Current Affairs January 2024

What is the correct answer?

4

_______ body looks after the protocol identifiers used over Internet.

A. Transmission Control Protocol

B. Telnet protocol

C. Internet Protocol

D. Network Control Protocol

Correct Answer :

D. Network Control Protocol


Related Questions

What is the correct answer?

4

Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire

A. i) only

B. i) and ii) only

C. iii) only

D. i) ,ii) and iii)

What is the correct answer?

4

Which of the following algorithms are meant for establishing the paths through the network?

A. Unicast

B. Broadcast

C. Multicast

D. Any cast

What is the correct answer?

4

ADSL uses high-speed Internet service phone lines

A. True.

B. False.

What is the correct answer?

4

Which of the following is defined in RFC 4366?

A. Secure File Trasfer Protocol (SFTP)

B. Trivial File Transfer Protocol (TFTP)

C. File Transfer Protocol (FTP)

D. Transport Layer Security (TLS)

What is the correct answer?

4

Which type of connector is used on 10Base2 networks?

A. SC

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

ARP is defined in RFC _____ and it is a current internet standard, ________

A. RFC-37, STD 903

B. RFC-903, STD 37

C. RFC 826; STD 37

D. RFC 37; STD 826

What is the correct answer?

4

25 is used by SMTP

A. True.

B. False.

What is the correct answer?

4

The network interface layer specifies how to organize data into………………………..and Internet layer specifies the format of …………………….. Sent across an Internet.

A. Bits, message.

B. frame,packet.

C. packet, messge.

D. datagram, packet.

What is the correct answer?

4

TCP protocol is responsible for logical addressing and delivery of packets.

A. True.

B. False.

What is the correct answer?

4

AppleTalk protocol configures hosts in zones on the network.

A. True.

B. False.

What is the correct answer?

4

Internet Research Task Force (IRTF) body looks after ________.

A. The research projects of TCP/IP suit

B. Technical related issues

C. Development of standards like Requests for Comments

D. Maintenance of Internet

What is the correct answer?

4

You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain name resolution?

A. Contoso.com, contoso.org, microsoft.com, com

B. Contoso.com, org, microsoft.org, org

C. Contoso.org, org, root [.], com, microsoft.com

D. Microsoft.com, com, org, contoso.org

What is the correct answer?

4

Thick Ethernet cable uses what type of connector? Select all that apply.

A. RJ-45

B. AUI

C. DB-15

D. BNC

What is the correct answer?

4

Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.

A. 6

B. 7

C. 2

D. 3

What is the correct answer?

4

What is the address identified when socket is available at each end of TCP?

A. "<TCP, IP address, socket number>."

B. "<TCP, Host address, port address>."

C. "<TCP, IP address, port number>."

D. "<TCP, Network address, socket address>."

What is the correct answer?

4

Which of these cable is/are used to connect devices to hubs and switches.

A. crossover

B. straight-through

C. co-axial

D. both A) and B)

What is the correct answer?

4

Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?

A. ISDN Basic Rate Interface (BRI)

B. ISDN Primary Rate Interface (PRI)

C. Point-to-Point circuit (PPP)

D. ISDN NRZ encoding

What is the correct answer?

4

At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?

A. Physical

B. Network

C. Transport

D. Application

What is the correct answer?

4

Which of the following can translate between dissimilar protocols and network types?

A. Hub

B. Repeater

C. Switch

D. Gateway

What is the correct answer?

4

________acts as source and destination for IP traffic.

A. Interface

B. Node

C. Host

D. Router

What is the correct answer?

4

Which of the following provides control over multimedia sessions?

A. Session Initiation Protocol (SIP)

B. Session Description Protocol (SDP)

C. Session Announcement Protocol (SAP)

D. Real-time Control Protocol (RTCP)

What is the correct answer?

4

Internet Architecture Board (IAB) governs which of the following bodies?

A. Internet Assigned Number Authority (IANA)

B. Internet Research Task Force (IRTF)

C. Internet Engineering Task Force (IETF)

D. All of the above

What is the correct answer?

4

In FTP, to execute a file transfer, the user begins by _________.

A. Navigating the directory structure

B. Connecting to a remote host

C. Listing files available for transfer.

D. Defining the transfer mode

What is the correct answer?

4

Which of the following is a media type that is most susceptible to interference?

A. Shielded twisted pair (STP)

B. Fiber optics

C. Unshielded twisted pair (UTP)

D. Coaxial

What is the correct answer?

4

What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.

A. 25 meters

B. 100 meters

C. 328 feet

D. 1000 feet

What is the correct answer?

4

Which class does the IP address 202.119.22.31 belong to?

A. Class A

B. Class B

C. Class C

D. APIPA

What is the correct answer?

4

Transmission medias are classified into two main categories, which are -------------- and --------------------.

A. twisted pair, coaxial

B. guided , unguided

C. analog, digital

D. synchronous, Asynchronous

What is the correct answer?

4

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….

A. Skeleton

B. Private

C. Public

D. Symmetric

What is the correct answer?

4

Internet e-mail system based on the ……………………………………………..

A. FTP

B. Simple Mail Transfer Protocol (SMTP)

C. POP

D. Both SMTP and POP

What is the correct answer?

4

You're configuring a dial-up connection to an ISP. Which of the following protocols is used?

A. PPTP

B. PPP

C. VPN

D. IPSec