Home
Current Affairs January 2024

What is the correct answer?

4

In ----------------------- configuration, the switch begins to forward the packet as soon as it is received. No error checking is performed on the packet, so the packet is moved through very quickly.

A. cut-free

B. franment-free

C. store-and-forward

D. cut-through

Correct Answer :

D. cut-through


Related Questions

What is the correct answer?

4

A time exceeded message is generated if ………………………………………………….

A. The round trip time between hosts is close to zero.

B. The Time-to Live field has a zero value.

C. Fragments of a message do not arrive within a set time

D. both b & c

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

Which type of connector is used on 10Base2 networks?

A. SC

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?

A. ICA

B. Telnet

C. RAS

D. HTTP

What is the correct answer?

4

You're configuring a dial-up connection to an ISP. Which of the following protocols is used?

A. PPTP

B. PPP

C. VPN

D. IPSec

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

Which of the following can translate between dissimilar protocols and network types?

A. Hub

B. Repeater

C. Switch

D. Gateway

What is the correct answer?

4

Which of the following is required to communicate between two computers?

A. Communications software

B. Protocol

C. Communication hardware

D. All of the above including access to transmission medium

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

What is attenuation?

A. cable noise

B. cable shortage

C. loss of signal strength

D. unwanted signals on the network

What is the correct answer?

4

Which is the port used by POP3?

A. 69

B. 110

C. 143

D. 443

What is the correct answer?

4

BGP is …………………………………….routing protocol used to ………………………….routing table.

A. intrautonomous system, update

B. Interautonomous system, update

C. Interautonomous system, create

D. intrautonomous system, create

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

Which of the following filed represents the sender of the message in an electronic mail?

A. To

B. From

C. Cc

D. Reply-to

What is the correct answer?

4

Which of the following protocol was developed to overcome limitations of Routing
Information Protocol (RIP)?

A. Border Gateway Protocol (BGP)

B. Exterior Gateway Protocol (EGP)

C. Enhanced Interior Gateway Routing Protocol (EIGRP)

D. Open Shortest Path First (OSPF)

What is the correct answer?

4

Which of the following protocol resolves a host's hardware address for a known IP
address?

A. InATMARP protocol

B. ATMARP protocol

C. InARP protocol

D. ARP protocol

What is the correct answer?

4

________is a multicast extension to OSPF Version 2.

A. Multicast Source Discovery Protocol (MSDP)

B. Distance Vector Multicast Routing Protocol (DVMRP)

C. Multicast OSPF (MOSPF)

D. Internet Group Management Protocol (IGMP)

What is the correct answer?

4

How many 64-Kbps channels are used on an ISDN BRI?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of
servers?

A. CANCEL

B. ACK

C. OPTIONS

D. PRACK

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

TCP protocol is responsible for logical addressing and delivery of packets.

A. True.

B. False.

What is the correct answer?

4

________acts as source and destination for IP traffic.

A. Interface

B. Node

C. Host

D. Router

What is the correct answer?

4

Which of the following protocols is described in RFC 793?

A. Address Resolution Protocol (ARP)

B. Transmission Control Protocol (TCP)

C. Bootstrap Protocol (BOOTP)

D. User Datagram Protocol (UDP)

What is the correct answer?

4

ARP is defined in RFC _____ and it is a current internet standard, ________

A. RFC-37, STD 903

B. RFC-903, STD 37

C. RFC 826; STD 37

D. RFC 37; STD 826

What is the correct answer?

4

If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization can have at the most……………. networks and each of these networks that can support only…………………...hosts.

A. 1022 networks, 62 hosts.

B. 62 networks, 1022 hosts.

C. 4094 networks, 14 hosts.

D. 14 networks, 4094 hosts.

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

Strings enclosed in _______ quotation marks indicate single tokens.

A. Alphanumeric

B. Morse code

C. ASCII

D. Binary

What is the correct answer?

4

The Hamming Distance for the codes generated using either even or odd parity will be------------------

A. 2

B. 4

C. 1

D. 0

What is the correct answer?

4

………………….is a technique of conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.

A. Line coding

B. Demodulation

C. Modulation

D. Segmentation

What is the correct answer?

4

Which of the following are not the standard representations defined by Telnet protocol?

A. IP and AO

B. YTA and WAY

C. EC and EL

D. SYNCH