Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following algorithms are easy to implement and debug?

A. Hybrid algorithm

B. Path vector algorithm

C. Link state algorithm

D. Distance vector algorithms

Correct Answer :

D. Distance vector algorithms


Related Questions

What is the correct answer?

4

80 is the well-known port number for the HTTP service.

A. True.

B. False.

What is the correct answer?

4

How many 64-Kbps channels are used on an ISDN BRI?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

The general form of the SMTP destination address is ________________.

A. user% remote-host@gateway-host

B. user@host

C. local-part@domain-name

D. None of the above

What is the correct answer?

4

FDDI operates on 100 Mbps.

A. True.

B. False.

What is the correct answer?

4

Select the class C IP address from the following:

A. 122.10.8.25

B. 170.5.88.2

C. 191.5.26.1

D. 207.67.112.55

What is the correct answer?

4

Strings enclosed in _______ quotation marks indicate single tokens.

A. Alphanumeric

B. Morse code

C. ASCII

D. Binary

What is the correct answer?

4

You have a network card with the connector in question 43, and it also has a 15 pin female connector, the pins being in two rows. What type of card is it?

A. ethernet

B. token ring

C. arcnet

D. dlc

What is the correct answer?

4

----------------is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.

A. Distance vector

B. Congestion

C. Link state routing

D. Flooding

What is the correct answer?

4

_____________________ are set up to fulfill service ordering, service assurance, and
billing functions.

A. IPTV server

B. Users

C. Content servers

D. Complex Operation Support Systems (OSS)

What is the correct answer?

4

Which is the port used by POP3?

A. 69

B. 110

C. 143

D. 443

What is the correct answer?

4

Which of the following protocols were designed for terminal emulation to connect dissimilar systems?

A. Domain Name System

B. FTP

C. Telnet

D. Control Message Protocol

What is the correct answer?

4

________allows receiver to inform sender about the successful receiving of all the
segments.

A. SACK-permitted Option

B. Window scale option

C. Selective Acknowledgment (SACK)

D. Maximum segment size option

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

Which of these is an example for unguided transmission?

A. coaxial cable

B. optical fibers

C. wireless

D. twisted pairs

What is the correct answer?

4

Which of the following are not the standard representations defined by Telnet protocol?

A. IP and AO

B. YTA and WAY

C. EC and EL

D. SYNCH

What is the correct answer?

4

Which of the following can translate between dissimilar protocols and network types?

A. Hub

B. Repeater

C. Switch

D. Gateway

What is the correct answer?

4

UDP datagram has a header, which is of ________.

A. 16 bytes

B. 8-bytes

C. 32 bytes

D. 64 bytes

What is the correct answer?

4

A financial institution that issues the card to the purchaser is ________.

A. Merchant

B. Issuer

C. Acquirer payment gateway

D. Cardholder

What is the correct answer?

4

Which of the following is also known as IP masquerading?

A. Fiber Distributed Data Interface (FDDI)

B. Network Address Translation (NAT)

C. Classless Inter-Domain Routing (CIDR)

D. None of the above

What is the correct answer?

4

FTP servers by default listen on port ________ for incoming connections from FTP clients.

A. 20

B. 21

C. 23

D. 25

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

Which of the following is a media type that is most susceptible to interference?

A. Shielded twisted pair (STP)

B. Fiber optics

C. Unshielded twisted pair (UTP)

D. Coaxial

What is the correct answer?

4

Which function is not supported by E-mail?

A. authentication

B. composition

C. Disposition

D. Displaying

What is the correct answer?

4

Internet Research Task Force (IRTF) body looks after ________.

A. The research projects of TCP/IP suit

B. Technical related issues

C. Development of standards like Requests for Comments

D. Maintenance of Internet

What is the correct answer?

4

Which of the following is the IEEE specification for wireless networks?

A. 802.3

B. 802.5

C. 802.2

D. 802.11b

What is the correct answer?

4

What is the default subnet mask for a class B network?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.192.0

What is the correct answer?

4

How many number of host/machine can be attached to a network using a class B address?

A. 65,536

B. 128

C. 256

D. 16,777,216

What is the correct answer?

4

You're configuring a dial-up connection to an ISP. Which of the following protocols is used?

A. PPTP

B. PPP

C. VPN

D. IPSec

What is the correct answer?

4

You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should

A. Use Ipconfig /release to release the old DHCP address.

B. Use Winipcfg and click Release to release the old DHCP address.

C. Use Ifconfig to initialize the NIC.

D. Use Tracert to determine the problem.