Home
Current Affairs January 2024

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

Correct Answer :

D. 45


Related Questions

What is the correct answer?

4

Which of the following SIP request terminates a call?

A. ACK

B. BYE

C. INVITE

D. CANCEL

What is the correct answer?

4

How many 64-Kbps channels are used on an ISDN BRI?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

Which of the following is also known as IP masquerading?

A. Fiber Distributed Data Interface (FDDI)

B. Network Address Translation (NAT)

C. Classless Inter-Domain Routing (CIDR)

D. None of the above

What is the correct answer?

4

The network interface layer specifies how to organize data into………………………..and Internet layer specifies the format of …………………….. Sent across an Internet.

A. Bits, message.

B. frame,packet.

C. packet, messge.

D. datagram, packet.

What is the correct answer?

4

When collection of various computers seems a single coherent system to its client, then it is called

A. computer network

B. distributed system

C. both (a and (b

D. none of the mentioned

What is the correct answer?

4

Which directory service is used in Windows 2000 Server?

A. Active Directory

B. SAM

C. NDS

D. Bindery

What is the correct answer?

4

Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?

A. Network layer

B. Physical layer

C. TCP/IP transport layer

D. Data link layer

What is the correct answer?

4

What does a patch cable connect to within an Ethernet network?

A. The patch panel to the hub

B. The patch panel to the wall jack

C. The wall jack to the computer

D. The NIC directly to another computer's NIC

What is the correct answer?

4

Which of the following can translate between dissimilar protocols and network types?

A. Hub

B. Repeater

C. Switch

D. Gateway

What is the correct answer?

4

UDP datagram has a header, which is of ________.

A. 16 bytes

B. 8-bytes

C. 32 bytes

D. 64 bytes

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

127.0.0.1 address is reserved for internal loopback functions.

A. True.

B. False.

What is the correct answer?

4

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….

A. Skeleton

B. Private

C. Public

D. Symmetric

What is the correct answer?

4

Which of these is an example for unguided transmission?

A. coaxial cable

B. optical fibers

C. wireless

D. twisted pairs

What is the correct answer?

4

FDDI operates on 100 Mbps.

A. True.

B. False.

What is the correct answer?

4

What is the maximum distance of single-mode fiber (SMF)?

A. 300 meters

B. 500 meters

C. 2km

D. 850 meters

What is the correct answer?

4

Telnet protocol uses ___________ representation for the function Synchronize.

A. SYC

B. SYNCH

C. SNZ

D. SY

What is the correct answer?

4

Which of the following are not the standard representations defined by Telnet protocol?

A. IP and AO

B. YTA and WAY

C. EC and EL

D. SYNCH

What is the correct answer?

4

You wish to install a 100BaseT network. What type of cabling will you use?

A. CAT 3 UTP

B. CAT 5 UTP

C. Thinnet

D. Fiber optic

What is the correct answer?

4

Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?

A. Use IPX.

B. Implement NAT.

C. Use DHCP.

D. Use DNS.

What is the correct answer?

4

Which type of connector is used on 10Base2 networks?

A. SC

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

DSL stands for ------------------------

A. data subscriber lines

B. dual subscriber lines

C. delay subscriber lines

D. digital subscriber lines

What is the correct answer?

4

Which layer of the OSI model does a switch operate in?

A. Physical

B. Data-link

C. Network

D. Transport

What is the correct answer?

4

In 1996, 36.44% of _________ addresses were brought in use.

A. Class A

B. Class D

C. Class B

D. Class C

What is the correct answer?

4

What is the default port for Telnet?

A. 23

B. 21

C. 25

D. 80

What is the correct answer?

4

Strings enclosed in _______ quotation marks indicate single tokens.

A. Alphanumeric

B. Morse code

C. ASCII

D. Binary

What is the correct answer?

4

Which of the following fields holds the packets of several protocols?

A. NLPID field

B. Pad field

C. UI (0x03) field

D. Q.922 field

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

You're configuring a dial-up connection to an ISP. Which of the following protocols is used?

A. PPTP

B. PPP

C. VPN

D. IPSec

What is the correct answer?

4

AppleTalk protocol configures hosts in zones on the network.

A. True.

B. False.