Home
Current Affairs January 2024

What is the correct answer?

4

____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.

A. Enhanced Interior Gateway Routing Protocol (EIGRP)

B. User Datagram Protocol (UDP)

C. Border Gateway Protocol (BGP)

D. User Datagram Protocol (UDP)

Correct Answer :

C. Border Gateway Protocol (BGP)


Related Questions

What is the correct answer?

4

Which of the following provides the service for any casting?

A. IPV5

B. IPV6

C. IPV7

D. IPV8

What is the correct answer?

4

How many 64-Kbps channels are used on an ISDN BRI?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

BGP is …………………………………….routing protocol used to ………………………….routing table.

A. intrautonomous system, update

B. Interautonomous system, update

C. Interautonomous system, create

D. intrautonomous system, create

What is the correct answer?

4

Destination physical address in ARP request is a ………………………….address.

A. Unicast

B. Broadcast

C. Multicast

D. Anycast

What is the correct answer?

4

___________ is based on resources that are present within the Diffserv region.

A. Admission control

B. Packet scheduler

C. Packet classifier

D. Packet control

What is the correct answer?

4

Data Transmission is not a layer in the OSI model

A. True.

B. False.

What is the correct answer?

4

------------------- is/ are caused by the random motion of the electrons in a wire and is unavoidable.

A. Dispersion

B. Thermal noise

C. Delay distortion

D. all of these

What is the correct answer?

4

Which of the following is also known as IP masquerading?

A. Fiber Distributed Data Interface (FDDI)

B. Network Address Translation (NAT)

C. Classless Inter-Domain Routing (CIDR)

D. None of the above

What is the correct answer?

4

Using a class B address maximum of …………………networks can be defined with up to……………………..hosts per networks.

A. 2,097,152-------------254

B. 16,384-----------------65,536

C. 16,384---------------65,534

D. 126--------------------16,777,214

What is the correct answer?

4

Which of the following is the port used by SMTP?

A. 21

B. 23

C. 25

D. 80

What is the correct answer?

4

Which of the following protocol was developed to overcome limitations of Routing
Information Protocol (RIP)?

A. Border Gateway Protocol (BGP)

B. Exterior Gateway Protocol (EGP)

C. Enhanced Interior Gateway Routing Protocol (EIGRP)

D. Open Shortest Path First (OSPF)

What is the correct answer?

4

____________ was developed to support aggregation and summarization of routing
information.

A. Static Routing protocol

B. Enhanced Interior Gateway Routing Protocol (EIGRP)

C. Routing Information Protocol (RIP)

D. Border Gateway Protocol (BGP)

What is the correct answer?

4

How many number of host/machine can be attached to a network using a class B address?

A. 65,536

B. 128

C. 256

D. 16,777,216

What is the correct answer?

4

In the IP address 129.2.8.9, what does 129.2 specify?

A. Protocol address

B. Router address

C. Host number

D. Network number

What is the correct answer?

4

Which of the following can provide a backbone network of 600 meters in length without using repeaters?

A. 10BaseT

B. 100BaseT

C. 10Base5

D. 100BaseFX

What is the correct answer?

4

________allows receiver to inform sender about the successful receiving of all the
segments.

A. SACK-permitted Option

B. Window scale option

C. Selective Acknowledgment (SACK)

D. Maximum segment size option

What is the correct answer?

4

Which of the following states suggests that the connection has been ended either at the
request of the client or for any other reason?

A. Selected state

B. Authenticated state

C. Logout state

D. Non-authenticated state

What is the correct answer?

4

Which of the following is defined in RFC 4366?

A. Secure File Trasfer Protocol (SFTP)

B. Trivial File Transfer Protocol (TFTP)

C. File Transfer Protocol (FTP)

D. Transport Layer Security (TLS)

What is the correct answer?

4

FTP servers by default listen on port ________ for incoming connections from FTP clients.

A. 20

B. 21

C. 23

D. 25

What is the correct answer?

4

____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.

A. Enhanced Interior Gateway Routing Protocol (EIGRP)

B. User Datagram Protocol (UDP)

C. Border Gateway Protocol (BGP)

D. User Datagram Protocol (UDP)

What is the correct answer?

4

………………….is a technique of conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.

A. Line coding

B. Demodulation

C. Modulation

D. Segmentation

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

What is the length of MARKER field in BGP message header?

A. 1 byte

B. 2 byte

C. 16 byte

D. 19 byte

What is the correct answer?

4

You're configuring a dial-up connection to an ISP. Which of the following protocols is used?

A. PPTP

B. PPP

C. VPN

D. IPSec

What is the correct answer?

4

Which of the following fields holds the packets of several protocols?

A. NLPID field

B. Pad field

C. UI (0x03) field

D. Q.922 field

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

Select the standard for token ring using token-passing media access.

A. 802.2

B. 802.3

C. 802.5

D. 802.11(b)

What is the correct answer?

4

To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.

A. True.

B. False.

What is the correct answer?

4

Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.

A. 6

B. 7

C. 2

D. 3

What is the correct answer?

4

What is attenuation?

A. cable noise

B. cable shortage

C. loss of signal strength

D. unwanted signals on the network