Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following provides a structure for conveying message through TCP/IP network
to host?

A. Address Resolution protocol (ARP)

B. Internet Control Message Protocol (ICMP)

C. Bootstrap Protocol (BOOTP)

D. Dynamic Host Configuration Protocol (DHCP)

Correct Answer :

D. Dynamic Host Configuration Protocol (DHCP)


Related Questions

What is the correct answer?

4

In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?

A. Non-authenticated state

B. Authenticated state

C. Selected state

D. Logout state

What is the correct answer?

4

____________ was developed to support aggregation and summarization of routing
information.

A. Static Routing protocol

B. Enhanced Interior Gateway Routing Protocol (EIGRP)

C. Routing Information Protocol (RIP)

D. Border Gateway Protocol (BGP)

What is the correct answer?

4

Which of the following use default routes for inter domain routing?

A. Type 2

B. Type 4

C. Type 3

D. Type 1

What is the correct answer?

4

Which is the port used by HTTPS?

A. 123

B. 143

C. 69

D. 443

What is the correct answer?

4

Thinnet coaxial cable uses what type of connector?

A. RJ-45

B. AUI

C. MSAU

D. BNC

What is the correct answer?

4

Which of the following is the IEEE specification for wireless networks?

A. 802.3

B. 802.5

C. 802.2

D. 802.11b

What is the correct answer?

4

Which of the following protocols is described in RFC 793?

A. Address Resolution Protocol (ARP)

B. Transmission Control Protocol (TCP)

C. Bootstrap Protocol (BOOTP)

D. User Datagram Protocol (UDP)

What is the correct answer?

4

In an autonomous system with n areas, how many areas are connected to the backbone?

A. 1

B. N

C. N+1

D. N-1

What is the correct answer?

4

TCP protocol is responsible for logical addressing and delivery of packets.

A. True.

B. False.

What is the correct answer?

4

Which is the port used by HTTPS?

A. 123

B. 143

C. 69

D. 443

What is the correct answer?

4

Which of the following can be used to transfer files from a Unix server?

A. FTP

B. Telnet

C. IPX

D. Netstat

What is the correct answer?

4

AppleTalk protocol configures hosts in zones on the network.

A. True.

B. False.

What is the correct answer?

4

At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?

A. Physical

B. Network

C. Transport

D. Application

What is the correct answer?

4

Strings enclosed in _______ quotation marks indicate single tokens.

A. Alphanumeric

B. Morse code

C. ASCII

D. Binary

What is the correct answer?

4

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

What is the correct answer?

4

Which of the following IEEE specifications uses CSMA/CD?

A. 802.2

B. 802.3

C. 802.5

D. 802.11b

What is the correct answer?

4

In flags message attribute, which of the following flag indicates that message has been
completed?

A. \Deleted

B. \Recent

C. \Flagged

D. \Draft

What is the correct answer?

4

The special address 'THIS HOST' is referred to as

A. 0.0.0.0

B. 0.0.14.98

C. 127.0.0.127

D. 255.255.255.255

What is the correct answer?

4

Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.

A. 6

B. 7

C. 2

D. 3

What is the correct answer?

4

802.5 project standard defines Token Ring.

A. True.

B. False

What is the correct answer?

4

You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain name resolution?

A. Contoso.com, contoso.org, microsoft.com, com

B. Contoso.com, org, microsoft.org, org

C. Contoso.org, org, root [.], com, microsoft.com

D. Microsoft.com, com, org, contoso.org

What is the correct answer?

4

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

What is the correct answer?

4

What is the pattern of a preamble?

A. 11110000

B. 11111111

C. 00000000

D. none of these

What is the correct answer?

4

Which of the following application uses 1.5 Mbps bandwidth?

A. High speed internet browsing

B. Recording for later viewing

C. Two(2)other TV'S

D. One(1)high definition TV(HDTV)

What is the correct answer?

4

In TCP segment format _______indicates start of data.

A. RST

B. ACK

C. URG

D. Data Offset

What is the correct answer?

4

Which of the following connectors is used by UTP on a Fast Ethernet network?

A. ST

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16. The router cannot find the destination IP address in its routing table. Which ICMP message should be sent?

A. Time stamp request

B. Router solicitation

C. Destination Unreachable

D. Parameter problem on a datagram

What is the correct answer?

4

The worldwide Internet is a well-known example of ------------------.

A. PAN

B. Subnet

C. Intra-Network

D. Inter-network

What is the correct answer?

4

Which of the following transmission media suffers more from transmission impairment?

A. coaxial cable

B. Optical fiber

C. twisted pair

D. wave guides

What is the correct answer?

4

------------------- is/ are caused by the random motion of the electrons in a wire and is unavoidable.

A. Dispersion

B. Thermal noise

C. Delay distortion

D. all of these