Home
Current Affairs January 2024

What is the correct answer?

4

Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?

A. Network layer

B. Physical layer

C. TCP/IP transport layer

D. Data link layer

Correct Answer :

C. TCP/IP transport layer


Related Questions

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

In Integrated services model, ________ corresponds to token bucket filter.

A. Bspec

B. Filter spec

C. Rspec

D. Tspec

What is the correct answer?

4

Which of the following delivery methods works with only one source and one destination? Multicast

A. Multicast

B. Broadcast

C. Unicast

D. Any cast

What is the correct answer?

4

FDDI operates on 100 Mbps.

A. True.

B. False.

What is the correct answer?

4

T1 makes up 24 channels.

A. True.

B. False.

What is the correct answer?

4

You have a network card with the connector in question 43, and it also has a 9 pin female connector. What type of card is it?

A. ethernet

B. token ring

C. fiber optic

D. ipx/spx

What is the correct answer?

4

Which of the following is used for establishing, configuring, and testing the data-link
Link Control Protocol (LCP)

A. Method

B. Network Control Protocols (NCPs)

C. Link Control Protocol (LCP)

D. File transfer protocol(FTP)

What is the correct answer?

4

What layer of the OSI protocol reference model does a bridge operate under?

A. Physical

B. Data-link

C. Network

D. Transport

What is the correct answer?

4

Which class does the IP address 202.119.22.31 belong to?

A. Class A

B. Class B

C. Class C

D. APIPA

What is the correct answer?

4

In ________ routing, the tunnel creates a bridge through areas that do not support
multicast traffic.

A. Internet

B. MBONE

C. Border Gateway Protocol

D. Multicast OSPF

What is the correct answer?

4

127.0.0.1 address is reserved for internal loopback functions.

A. True.

B. False.

What is the correct answer?

4

________allows receiver to inform sender about the successful receiving of all the
segments.

A. SACK-permitted Option

B. Window scale option

C. Selective Acknowledgment (SACK)

D. Maximum segment size option

What is the correct answer?

4

What is the code used for Interpret As Command (IAC)?

A. 253

B. 255

C. 240

D. 241

What is the correct answer?

4

Which field in Domain Name System message format specifies the class of query?

A. Type

B. Class

C. Rdlength

D. Rdata

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.

A. 25 meters

B. 100 meters

C. 328 feet

D. 1000 feet

What is the correct answer?

4

Which of the following protocols is not routable?

A. TCP/IP

B. IPX/SPX

C. AppleTalk

D. NetBEUI

What is the correct answer?

4

What is the maximum distance of single-mode fiber (SMF)?

A. 300 meters

B. 500 meters

C. 2km

D. 850 meters

What is the correct answer?

4

Which of the following is the port used by SMTP?

A. 21

B. 23

C. 25

D. 80

What is the correct answer?

4

25 is used by SMTP

A. True.

B. False.

What is the correct answer?

4

Which of the following connectors is used by UTP on a Fast Ethernet network?

A. ST

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

What is the distance limitation of Cat5 UTP?

A. 1 km

B. 100 km

C. 100 m

D. 100 foot

What is the correct answer?

4

The Point-to-Point Protocol (PPP) is described in which of the following?

A. RFC 3390 AND RFC 3392

B. RFC 1661 AND RFC 1662

C. RFC 2490 AND RFC 2492

D. RFC 2225 AND RFC 2226

What is the correct answer?

4

You have a network card with only one connector, which looks like a place to plug an oversized phone cord. What type of card is it?

A. token ring

B. decnet

C. d. ethernet

D. fiber optic

What is the correct answer?

4

A time exceeded message is generated if ………………………………………………….

A. The round trip time between hosts is close to zero.

B. The Time-to Live field has a zero value.

C. Fragments of a message do not arrive within a set time

D. both b & c

What is the correct answer?

4

In FTP, to execute a file transfer, the user begins by _________.

A. Navigating the directory structure

B. Connecting to a remote host

C. Listing files available for transfer.

D. Defining the transfer mode

What is the correct answer?

4

TCP protocol is responsible for logical addressing and delivery of packets.

A. True.

B. False.

What is the correct answer?

4

AppleTalk protocol configures hosts in zones on the network.

A. True.

B. False.

What is the correct answer?

4

________is a multicast extension to OSPF Version 2.

A. Multicast Source Discovery Protocol (MSDP)

B. Distance Vector Multicast Routing Protocol (DVMRP)

C. Multicast OSPF (MOSPF)

D. Internet Group Management Protocol (IGMP)

What is the correct answer?

4

preamble field of 802.3 frames is encoded using ------------------- encoding

A. Manchester

B. differential Manchester

C. Bi polar

D. uni polar