Home
Current Affairs January 2024

What is the correct answer?

4

How many 64-Kbps channels are used on an ISDN BRI?

A. 1

B. 2

C. 3

D. 4

Correct Answer :

B. 2


Related Questions

What is the correct answer?

4

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

What is the correct answer?

4

80 is the well-known port number for the HTTP service.

A. True.

B. False.

What is the correct answer?

4

Which of the following can provide a backbone network of 600 meters in length without using repeaters?

A. 10BaseT

B. 100BaseT

C. 10Base5

D. 100BaseFX

What is the correct answer?

4

Which of the following protocol resolves a host's hardware address for a known IP
address?

A. InATMARP protocol

B. ATMARP protocol

C. InARP protocol

D. ARP protocol

What is the correct answer?

4

Which of these is a feature of hubs?

A. Hubs amplify the incoming signal.

B. Hubs understand frames, packets or headers

C. All lines coming into a Hub must operate at a same speed.

D. all of these

What is the correct answer?

4

How many layers are there in the OSI model?

A. 4

B. 5

C. 6

D. 7

What is the correct answer?

4

802.5 project standard defines Token Ring.

A. True.

B. False

What is the correct answer?

4

How many table entries are supported by global routing table in CIDR?

A. 90,000

B. 80,000

C. 70,000

D. 60,000

What is the correct answer?

4

You have a network card with only one connector, which looks like a place to plug an oversized phone cord. What type of card is it?

A. token ring

B. decnet

C. d. ethernet

D. fiber optic

What is the correct answer?

4

Which is the port used by POP3?

A. 69

B. 110

C. 143

D. 443

What is the correct answer?

4

The Hamming Distance for the codes generated using either even or odd parity will be------------------

A. 2

B. 4

C. 1

D. 0

What is the correct answer?

4

Which of the following transmission media suffers more from transmission impairment?

A. coaxial cable

B. Optical fiber

C. twisted pair

D. wave guides

What is the correct answer?

4

………………….is a technique of conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.

A. Line coding

B. Demodulation

C. Modulation

D. Segmentation

What is the correct answer?

4

FDDI operates on 100 Mbps.

A. True.

B. False.

What is the correct answer?

4

You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?

A. ICA

B. Telnet

C. RAS

D. HTTP

What is the correct answer?

4

A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?

A. DSL

B. Cable modem

C. ISDN

D. T1

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should

A. Use Ipconfig /release to release the old DHCP address.

B. Use Winipcfg and click Release to release the old DHCP address.

C. Use Ifconfig to initialize the NIC.

D. Use Tracert to determine the problem.

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

Which is the port used by HTTPS?

A. 123

B. 143

C. 69

D. 443

What is the correct answer?

4

Pure ALOHA has a maximum throughput of -----------

A. 16.4 %

B. 18.4 %

C. 7.4 %

D. 1 %

What is the correct answer?

4

--------------- is/are used for error detection.

A. Parity bit

B. checksum

C. both A) and B)

D. neither A) nor B).

What is the correct answer?

4

Which of the following is defined in RFC 4366?

A. Secure File Trasfer Protocol (SFTP)

B. Trivial File Transfer Protocol (TFTP)

C. File Transfer Protocol (FTP)

D. Transport Layer Security (TLS)

What is the correct answer?

4

What can be used in the place of DNS to resolve host names to IP addresses?

A. WINS

B. LMHosts

C. Hosts

D. DHCP

What is the correct answer?

4

In distance vector routing an active router sends out information ………………………….

A. Only when there is a change in its table

B. Only when a new host is added

C. At regularly scheduled intervals

D. Only when a new network is added

What is the correct answer?

4

Which type of connector is used on 10Base2 networks?

A. SC

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

Which of the following SIP request terminates a call?

A. ACK

B. BYE

C. INVITE

D. CANCEL

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

Which piece of equipment operates at both the data-link and network layers?

A. Hub

B. Bridge

C. Brouter

D. Router