Home

What is the correct answer?

4

The Hamming Distance for the codes generated using either even or odd parity will be------------------

A. 2

B. 4

C. 1

D. 0

Correct Answer :

A. 2


Related Questions

What is the correct answer?

4

Which of the following algorithms are easy to implement and debug?

A. Hybrid algorithm

B. Path vector algorithm

C. Link state algorithm

D. Distance vector algorithms

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

What is the IEEE specification for Ethernet?

A. 802.1

B. 802.2

C. 802.3

D. 802.4

What is the correct answer?

4

Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.

A. 6

B. 7

C. 2

D. 3

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

What is the length of MARKER field in BGP message header?

A. 1 byte

B. 2 byte

C. 16 byte

D. 19 byte

What is the correct answer?

4

Which of the following can translate between dissimilar protocols and network types?

A. Hub

B. Repeater

C. Switch

D. Gateway

What is the correct answer?

4

Which of these cable is/are used to connect devices to hubs and switches.

A. crossover

B. straight-through

C. co-axial

D. both A) and B)

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?

A. ISDN Basic Rate Interface (BRI)

B. ISDN Primary Rate Interface (PRI)

C. Point-to-Point circuit (PPP)

D. ISDN NRZ encoding

What is the correct answer?

4

________is a multicast extension to OSPF Version 2.

A. Multicast Source Discovery Protocol (MSDP)

B. Distance Vector Multicast Routing Protocol (DVMRP)

C. Multicast OSPF (MOSPF)

D. Internet Group Management Protocol (IGMP)

What is the correct answer?

4

Which of the following protocols use a topology table to install routes into the IP routing
table?

A. Open Shortest Path First (OSPF)

B. Enhanced Interior Gateway Routing Protocol (EIGRP)

C. Exterior Gateway Protocol (EGP)

D. Static routing protocols

What is the correct answer?

4

Which of the following delivery methods works with only one source and one destination? Multicast

A. Multicast

B. Broadcast

C. Unicast

D. Any cast

What is the correct answer?

4

Which OSI model layer provides for encryption and decryption of data?

A. Data-link

B. Transport

C. Presentation

D. Application

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

The special address 'THIS HOST' is referred to as

A. 0.0.0.0

B. 0.0.14.98

C. 127.0.0.127

D. 255.255.255.255

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

Data Transmission is not a layer in the OSI model

A. True.

B. False.

What is the correct answer?

4

ARP is defined in RFC _____ and it is a current internet standard, ________

A. RFC-37, STD 903

B. RFC-903, STD 37

C. RFC 826; STD 37

D. RFC 37; STD 826

What is the correct answer?

4

Using a class B address maximum of …………………networks can be defined with up to……………………..hosts per networks.

A. 2,097,152-------------254

B. 16,384-----------------65,536

C. 16,384---------------65,534

D. 126--------------------16,777,214

What is the correct answer?

4

Which cable type is immune to outside interference and crosstalk?

A. Thinnet

B. Twisted pair

C. Fiber optic

D. Thicknet

What is the correct answer?

4

The general form of the SMTP destination address is ________________.

A. user% remote-host@gateway-host

B. user@host

C. local-part@domain-name

D. None of the above

What is the correct answer?

4

………………….is a technique of conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.

A. Line coding

B. Demodulation

C. Modulation

D. Segmentation

What is the correct answer?

4

Which of the following network topologies has the highest level of redundancy?

A. Bus

B. Star

C. Star

D. Mesh

What is the correct answer?

4

Which of the following is also known as IP masquerading?

A. Fiber Distributed Data Interface (FDDI)

B. Network Address Translation (NAT)

C. Classless Inter-Domain Routing (CIDR)

D. None of the above

What is the correct answer?

4

Which directory service is used in Windows 2000 Server?

A. Active Directory

B. SAM

C. NDS

D. Bindery

What is the correct answer?

4

If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization can have at the most……………. networks and each of these networks that can support only…………………...hosts.

A. 1022 networks, 62 hosts.

B. 62 networks, 1022 hosts.

C. 4094 networks, 14 hosts.

D. 14 networks, 4094 hosts.

What is the correct answer?

4

What can be used in the place of DNS to resolve host names to IP addresses?

A. WINS

B. LMHosts

C. Hosts

D. DHCP

What is the correct answer?

4

Which of the following is used for testing the data-link connection in a PPP network?

A. Link Control Protocol (LCP)

B. Method

C. Network Control Protocols (NCPs)

D. Basic Rate Interface (BRI)

What is the correct answer?

4

Which of the following protocols are considered unreliable or connectionless?

A. UDP

B. TCP

C. FTP

D. TFTP