Home
Current Affairs January 2024

What is the correct answer?

4

In the IP address 129.2.8.9, what does 129.2 specify?

A. Protocol address

B. Router address

C. Host number

D. Network number

Correct Answer :

D. Network number


Related Questions

What is the correct answer?

4

Which cable type is immune to outside interference and crosstalk?

A. Thinnet

B. Twisted pair

C. Fiber optic

D. Thicknet

What is the correct answer?

4

Destination physical address in ARP request is a ………………………….address.

A. Unicast

B. Broadcast

C. Multicast

D. Anycast

What is the correct answer?

4

Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of
servers?

A. CANCEL

B. ACK

C. OPTIONS

D. PRACK

What is the correct answer?

4

----------------is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.

A. Distance vector

B. Congestion

C. Link state routing

D. Flooding

What is the correct answer?

4

To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.

A. True.

B. False.

What is the correct answer?

4

You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should

A. Use Ipconfig /release to release the old DHCP address.

B. Use Winipcfg and click Release to release the old DHCP address.

C. Use Ifconfig to initialize the NIC.

D. Use Tracert to determine the problem.

What is the correct answer?

4

A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?

A. DSL

B. Cable modem

C. ISDN

D. T1

What is the correct answer?

4

127.0.0.1 address is reserved for internal loopback functions.

A. True.

B. False.

What is the correct answer?

4

Which of the following delivery methods works with only one source and one destination? Multicast

A. Multicast

B. Broadcast

C. Unicast

D. Any cast

What is the correct answer?

4

FTP servers by default listen on port ________ for incoming connections from FTP clients.

A. 20

B. 21

C. 23

D. 25

What is the correct answer?

4

In the symmetric-key method of cryptography, which key is publicly known?

A. Encryption key only

B. Decryption key only

C. Both

D. None of the above

What is the correct answer?

4

What is the default port for Telnet?

A. 23

B. 21

C. 25

D. 80

What is the correct answer?

4

Which of the following is defined in RFC 4366?

A. Secure File Trasfer Protocol (SFTP)

B. Trivial File Transfer Protocol (TFTP)

C. File Transfer Protocol (FTP)

D. Transport Layer Security (TLS)

What is the correct answer?

4

In the IP address 129.2.8.9, what does 129.2 specify?

A. Protocol address

B. Router address

C. Host number

D. Network number

What is the correct answer?

4

Which layer of the OSI model does a switch operate in?

A. Physical

B. Data-link

C. Network

D. Transport

What is the correct answer?

4

Which piece of equipment operates at both the data-link and network layers?

A. Hub

B. Bridge

C. Brouter

D. Router

What is the correct answer?

4

What is attenuation?

A. cable noise

B. cable shortage

C. loss of signal strength

D. unwanted signals on the network

What is the correct answer?

4

If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization can have at the most……………. networks and each of these networks that can support only…………………...hosts.

A. 1022 networks, 62 hosts.

B. 62 networks, 1022 hosts.

C. 4094 networks, 14 hosts.

D. 14 networks, 4094 hosts.

What is the correct answer?

4

A node, which is more powerful, and can handle local information processing or graphics processing is called a------------------.

A. Workstation

B. Server

C. Network Operating System

D. Peer system

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

In FTP, to execute a file transfer, the user begins by _________.

A. Navigating the directory structure

B. Connecting to a remote host

C. Listing files available for transfer.

D. Defining the transfer mode

What is the correct answer?

4

80 is the well-known port number for the HTTP service.

A. True.

B. False.

What is the correct answer?

4

Select the standard for token ring using token-passing media access.

A. 802.2

B. 802.3

C. 802.5

D. 802.11(b)

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

Thick Ethernet cable uses what type of connector? Select all that apply.

A. RJ-45

B. AUI

C. DB-15

D. BNC

What is the correct answer?

4

--------------- is/are used for error detection.

A. Parity bit

B. checksum

C. both A) and B)

D. neither A) nor B).

What is the correct answer?

4

What layer of the OSI protocol reference model does a bridge operate under?

A. Physical

B. Data-link

C. Network

D. Transport

What is the correct answer?

4

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….

A. Skeleton

B. Private

C. Public

D. Symmetric