Home
Current Affairs January 2024

What is the correct answer?

4

Internet Architecture Board (IAB) governs which of the following bodies?

A. Internet Assigned Number Authority (IANA)

B. Internet Research Task Force (IRTF)

C. Internet Engineering Task Force (IETF)

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

Which of the following protocol resolves a host's hardware address for a known IP
address?

A. InATMARP protocol

B. ATMARP protocol

C. InARP protocol

D. ARP protocol

What is the correct answer?

4

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….

A. Skeleton

B. Private

C. Public

D. Symmetric

What is the correct answer?

4

Which of the following filed represents the sender of the message in an electronic mail?

A. To

B. From

C. Cc

D. Reply-to

What is the correct answer?

4

Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?

A. Use IPX.

B. Implement NAT.

C. Use DHCP.

D. Use DNS.

What is the correct answer?

4

Which of the following fields holds the packets of several protocols?

A. NLPID field

B. Pad field

C. UI (0x03) field

D. Q.922 field

What is the correct answer?

4

What is attenuation?

A. cable noise

B. cable shortage

C. loss of signal strength

D. unwanted signals on the network

What is the correct answer?

4

What is the maximum length of thick Ethernet cable before a signal booster is needed?

A. 500 feet

B. 500 meters

C. 1000 feet

D. 2 miles

What is the correct answer?

4

What can be used in the place of DNS to resolve host names to IP addresses?

A. WINS

B. LMHosts

C. Hosts

D. DHCP

What is the correct answer?

4

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

What is the correct answer?

4

25 is used by SMTP

A. True.

B. False.

What is the correct answer?

4

Which of the following are not the standard representations defined by Telnet protocol?

A. IP and AO

B. YTA and WAY

C. EC and EL

D. SYNCH

What is the correct answer?

4

Which piece of equipment operates at both the data-link and network layers?

A. Hub

B. Bridge

C. Brouter

D. Router

What is the correct answer?

4

AppleTalk protocol configures hosts in zones on the network.

A. True.

B. False.

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

Which of the following was initially designed as a video and audio compression standard?

A. MPEG-1

B. MPEG-2

C. MPEG-4

D. MPEG-3

What is the correct answer?

4

Data Transmission is not a layer in the OSI model

A. True.

B. False.

What is the correct answer?

4

80 is the well-known port number for the HTTP service.

A. True.

B. False.

What is the correct answer?

4

Which of the following algorithms are meant for establishing the paths through the network?

A. Unicast

B. Broadcast

C. Multicast

D. Any cast

What is the correct answer?

4

___________ is based on resources that are present within the Diffserv region.

A. Admission control

B. Packet scheduler

C. Packet classifier

D. Packet control

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

Select the class C IP address from the following:

A. 122.10.8.25

B. 170.5.88.2

C. 191.5.26.1

D. 207.67.112.55

What is the correct answer?

4

How many table entries are supported by global routing table in CIDR?

A. 90,000

B. 80,000

C. 70,000

D. 60,000

What is the correct answer?

4

What is the code used for Interpret As Command (IAC)?

A. 253

B. 255

C. 240

D. 241

What is the correct answer?

4

In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?

A. Non-authenticated state

B. Authenticated state

C. Selected state

D. Logout state

What is the correct answer?

4

Which function is not supported by E-mail?

A. authentication

B. composition

C. Disposition

D. Displaying

What is the correct answer?

4

________acts as source and destination for IP traffic.

A. Interface

B. Node

C. Host

D. Router

What is the correct answer?

4

____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.

A. Enhanced Interior Gateway Routing Protocol (EIGRP)

B. User Datagram Protocol (UDP)

C. Border Gateway Protocol (BGP)

D. User Datagram Protocol (UDP)

What is the correct answer?

4

Which of the following is required to communicate between two computers?

A. Communications software

B. Protocol

C. Communication hardware

D. All of the above including access to transmission medium

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

In FTP, to execute a file transfer, the user begins by _________.

A. Navigating the directory structure

B. Connecting to a remote host

C. Listing files available for transfer.

D. Defining the transfer mode