Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following pieces of equipment will receive a packet from one port and forward that packet out the one port to which the destination computer is connected?

A. Hub

B. MAU

C. Switch

D. TDR

Correct Answer :

C. Switch


Related Questions

What is the correct answer?

4

In the symmetric-key method of cryptography, which key is publicly known?

A. Encryption key only

B. Decryption key only

C. Both

D. None of the above

What is the correct answer?

4

T1 makes up 24 channels.

A. True.

B. False.

What is the correct answer?

4

What is the default port for Telnet?

A. 23

B. 21

C. 25

D. 80

What is the correct answer?

4

Which layer of the OSI model does a switch operate in?

A. Physical

B. Data-link

C. Network

D. Transport

What is the correct answer?

4

Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of
servers?

A. CANCEL

B. ACK

C. OPTIONS

D. PRACK

What is the correct answer?

4

Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire

A. i) only

B. i) and ii) only

C. iii) only

D. i) ,ii) and iii)

What is the correct answer?

4

Which type of BGP message is sent by a system to notify another router of the senders existence?

A. Keep-alive

B. Notification

C. Open

D. Update

What is the correct answer?

4

Which of the following is required to communicate between two computers?

A. Communications software

B. Protocol

C. Communication hardware

D. All of the above including access to transmission medium

What is the correct answer?

4

TCP protocol is responsible for logical addressing and delivery of packets.

A. True.

B. False.

What is the correct answer?

4

Telnet protocol uses ___________ representation for the function Synchronize.

A. SYC

B. SYNCH

C. SNZ

D. SY

What is the correct answer?

4

In the IP address 129.2.8.9, what does 129.2 specify?

A. Protocol address

B. Router address

C. Host number

D. Network number

What is the correct answer?

4

Which of the following is used for testing the data-link connection in a PPP network?

A. Link Control Protocol (LCP)

B. Method

C. Network Control Protocols (NCPs)

D. Basic Rate Interface (BRI)

What is the correct answer?

4

----------------is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.

A. Distance vector

B. Congestion

C. Link state routing

D. Flooding

What is the correct answer?

4

Which of the following IEEE specifications uses CSMA/CD?

A. 802.2

B. 802.3

C. 802.5

D. 802.11b

What is the correct answer?

4

Which of the following transmission media suffers more from transmission impairment?

A. coaxial cable

B. Optical fiber

C. twisted pair

D. wave guides

What is the correct answer?

4

Which of the following protocols were designed for terminal emulation to connect dissimilar systems?

A. Domain Name System

B. FTP

C. Telnet

D. Control Message Protocol

What is the correct answer?

4

What is the maximum length of thick Ethernet cable before a signal booster is needed?

A. 500 feet

B. 500 meters

C. 1000 feet

D. 2 miles

What is the correct answer?

4

ICMP messages require ………………. levels of encapsulation

A. One

B. Two

C. Three

D. Four

What is the correct answer?

4

Which of the following filed represents the sender of the message in an electronic mail?

A. To

B. From

C. Cc

D. Reply-to

What is the correct answer?

4

The Point-to-Point Protocol (PPP) is described in which of the following?

A. RFC 3390 AND RFC 3392

B. RFC 1661 AND RFC 1662

C. RFC 2490 AND RFC 2492

D. RFC 2225 AND RFC 2226

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

25 is used by SMTP

A. True.

B. False.

What is the correct answer?

4

Which is the port used by HTTPS?

A. 123

B. 143

C. 69

D. 443

What is the correct answer?

4

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….

A. Skeleton

B. Private

C. Public

D. Symmetric

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain name resolution?

A. Contoso.com, contoso.org, microsoft.com, com

B. Contoso.com, org, microsoft.org, org

C. Contoso.org, org, root [.], com, microsoft.com

D. Microsoft.com, com, org, contoso.org

What is the correct answer?

4

T1 makes up 24 channels.

A. True.

B. False.

What is the correct answer?

4

How many 64-Kbps channels are used on an ISDN BRI?

A. 1

B. 2

C. 3

D. 4

What is the correct answer?

4

What is the maximum distance of single-mode fiber (SMF)?

A. 300 meters

B. 500 meters

C. 2km

D. 850 meters

What is the correct answer?

4

Which of the following use default routes for inter domain routing?

A. Type 2

B. Type 4

C. Type 3

D. Type 1