Home

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

Correct Answer :

D. 45


Related Questions

What is the correct answer?

4

How many table entries are supported by global routing table in CIDR?

A. 90,000

B. 80,000

C. 70,000

D. 60,000

What is the correct answer?

4

Which type of connector is used on 10Base2 networks?

A. SC

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

E-mail is an example of ………………………… mode of communication where one party can send a note to another person and the recipient need not be online to receive the e-mail.

A. asynchronous

B. synchronous

C. full duplex

D. either A or B

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

Which of the following protocols are considered unreliable or connectionless?

A. UDP

B. TCP

C. FTP

D. TFTP

What is the correct answer?

4

You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should

A. Use Ipconfig /release to release the old DHCP address.

B. Use Winipcfg and click Release to release the old DHCP address.

C. Use Ifconfig to initialize the NIC.

D. Use Tracert to determine the problem.

What is the correct answer?

4

A time exceeded message is generated if ………………………………………………….

A. The round trip time between hosts is close to zero.

B. The Time-to Live field has a zero value.

C. Fragments of a message do not arrive within a set time

D. both b & c

What is the correct answer?

4

In an active mode if any FTP client sends the port command "PORT 192,168,0,1,4,1" then
what will be the interpretation of port field?

A. 1024

B. 1025

C. 1023

D. 227

What is the correct answer?

4

Which of the following algorithms are easy to implement and debug?

A. Hybrid algorithm

B. Path vector algorithm

C. Link state algorithm

D. Distance vector algorithms

What is the correct answer?

4

BGP is …………………………………….routing protocol used to ………………………….routing table.

A. intrautonomous system, update

B. Interautonomous system, update

C. Interautonomous system, create

D. intrautonomous system, create

What is the correct answer?

4

_______ body looks after the protocol identifiers used over Internet.

A. Transmission Control Protocol

B. Telnet protocol

C. Internet Protocol

D. Network Control Protocol

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.

A. Enhanced Interior Gateway Routing Protocol (EIGRP)

B. User Datagram Protocol (UDP)

C. Border Gateway Protocol (BGP)

D. User Datagram Protocol (UDP)

What is the correct answer?

4

________allows receiver to inform sender about the successful receiving of all the
segments.

A. SACK-permitted Option

B. Window scale option

C. Selective Acknowledgment (SACK)

D. Maximum segment size option

What is the correct answer?

4

--------------- is/are used for error detection.

A. Parity bit

B. checksum

C. both A) and B)

D. neither A) nor B).

What is the correct answer?

4

In FTP, to execute a file transfer, the user begins by _________.

A. Navigating the directory structure

B. Connecting to a remote host

C. Listing files available for transfer.

D. Defining the transfer mode

What is the correct answer?

4

Which piece of equipment operates at both the data-link and network layers?

A. Hub

B. Bridge

C. Brouter

D. Router

What is the correct answer?

4

In flags message attribute, which of the following flag indicates that message has been
completed?

A. \Deleted

B. \Recent

C. \Flagged

D. \Draft

What is the correct answer?

4

Which cable type is immune to outside interference and crosstalk?

A. Thinnet

B. Thicknet

C. Twisted pair

D. Fiber optic

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

SMTP protocol is responsible for sending email across the Internet

A. True.

B. False.

What is the correct answer?

4

Which of the following can translate between dissimilar protocols and network types?

A. Hub

B. Repeater

C. Switch

D. Gateway

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

Pure ALOHA has a maximum throughput of -----------

A. 16.4 %

B. 18.4 %

C. 7.4 %

D. 1 %

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

In 1996, 36.44% of _________ addresses were brought in use.

A. Class A

B. Class D

C. Class B

D. Class C

What is the correct answer?

4

…………………………..combines characteristics of linear bus and star topologies.

A. Ring topology

B. A hybrid topology

C. A tree topology

D. mesh topology

What is the correct answer?

4

In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?

A. Non-authenticated state

B. Authenticated state

C. Selected state

D. Logout state

What is the correct answer?

4

Which of the following protocol resolves a host's hardware address for a known IP
address?

A. InATMARP protocol

B. ATMARP protocol

C. InARP protocol

D. ARP protocol

What is the correct answer?

4

Which of the following is the port used by SMTP?

A. 21

B. 23

C. 25

D. 80