Home
Current Affairs January 2024

What is the correct answer?

4

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

Correct Answer :

A. Authorization


Related Questions

What is the correct answer?

4

In distance vector routing an active router sends out information ………………………….

A. Only when there is a change in its table

B. Only when a new host is added

C. At regularly scheduled intervals

D. Only when a new network is added

What is the correct answer?

4

Which of the following IEEE specifications uses CSMA/CD?

A. 802.2

B. 802.3

C. 802.5

D. 802.11b

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

Which function is not supported by E-mail?

A. authentication

B. composition

C. Disposition

D. Displaying

What is the correct answer?

4

In ________ routing, the tunnel creates a bridge through areas that do not support
multicast traffic.

A. Internet

B. MBONE

C. Border Gateway Protocol

D. Multicast OSPF

What is the correct answer?

4

Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?

A. Network layer

B. Physical layer

C. TCP/IP transport layer

D. Data link layer

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

A modem is a card within a PC that converts the …………... the computer produces to ………………….. that can pass over telephone system.

A. Data, signal

B. Analog signal, digital signal

C. Digital signal, analog signal

D. signal, data

What is the correct answer?

4

Which of the following SIP request terminates a call?

A. ACK

B. BYE

C. INVITE

D. CANCEL

What is the correct answer?

4

DSL stands for ------------------------

A. data subscriber lines

B. dual subscriber lines

C. delay subscriber lines

D. digital subscriber lines

What is the correct answer?

4

Which of the following pieces of equipment will receive a packet from one port and forward that packet out the one port to which the destination computer is connected?

A. Hub

B. MAU

C. Switch

D. TDR

What is the correct answer?

4

___________ is based on resources that are present within the Diffserv region.

A. Admission control

B. Packet scheduler

C. Packet classifier

D. Packet control

What is the correct answer?

4

What are the subnet mask in dotted decimal notation for /20 networks?

A. 255.255.252.0

B. 255.255.255.0

C. 255.255.254.0

D. 255.255.240.0

What is the correct answer?

4

E-mail is an example of ………………………… mode of communication where one party can send a note to another person and the recipient need not be online to receive the e-mail.

A. asynchronous

B. synchronous

C. full duplex

D. either A or B

What is the correct answer?

4

ADSL uses high-speed Internet service phone lines

A. True.

B. False.

What is the correct answer?

4

Which of the following can provide a backbone network of 600 meters in length without using repeaters?

A. 10BaseT

B. 100BaseT

C. 10Base5

D. 100BaseFX

What is the correct answer?

4

802.5 project standard defines Token Ring.

A. True.

B. False

What is the correct answer?

4

What is the maximum length of thick Ethernet cable before a signal booster is needed?

A. 500 feet

B. 500 meters

C. 1000 feet

D. 2 miles

What is the correct answer?

4

Where are routing tables placed?

A. in network interface card

B. in routers memory

C. in server memory

D. in a subnets memory

What is the correct answer?

4

What is the pattern of a preamble?

A. 11110000

B. 11111111

C. 00000000

D. none of these

What is the correct answer?

4

Select the class C IP address from the following:

A. 122.10.8.25

B. 170.5.88.2

C. 191.5.26.1

D. 207.67.112.55

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

Which of the following protocols use a topology table to install routes into the IP routing
table?

A. Open Shortest Path First (OSPF)

B. Enhanced Interior Gateway Routing Protocol (EIGRP)

C. Exterior Gateway Protocol (EGP)

D. Static routing protocols

What is the correct answer?

4

Which of the following is the IEEE specification for wireless networks?

A. 802.3

B. 802.5

C. 802.2

D. 802.11b

What is the correct answer?

4

Which of the following provides control over multimedia sessions?

A. Session Initiation Protocol (SIP)

B. Session Description Protocol (SDP)

C. Session Announcement Protocol (SAP)

D. Real-time Control Protocol (RTCP)

What is the correct answer?

4

Thick Ethernet cable uses what type of connector? Select all that apply.

A. RJ-45

B. AUI

C. DB-15

D. BNC

What is the correct answer?

4

_____________________ are set up to fulfill service ordering, service assurance, and
billing functions.

A. IPTV server

B. Users

C. Content servers

D. Complex Operation Support Systems (OSS)

What is the correct answer?

4

A time exceeded message is generated if ………………………………………………….

A. The round trip time between hosts is close to zero.

B. The Time-to Live field has a zero value.

C. Fragments of a message do not arrive within a set time

D. both b & c

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

TCP protocol is responsible for connection-oriented communication

A. True.

B. False.