1.Why IP Protocol is considered as unreliable?
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
...
Answer is D)
2.Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
...
Answer is D)
3.Which of the following is not the possible ways of data exchange?
A. Simplex
B. Multiplex
C. Half-duplex
D. Full-duplex
...
Answer is B)
4.A piece of icon or image on a web page associated with another webpage is called ______
a) url
b) hyperlink
c) plugin
d) extension
a) url
b) hyperlink
c) plugin
d) extension
...
Answer is b)
5. Dynamic web page ______
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both is same every time whenever it displays and generates on demand by a program or a request from browser
d) is different always in a predefined order
...
Answer is b)
6.A web cookie is a small piece of data that is _______
a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) sent from the root server to other root servers
...
Answer is a)
7.The _________ field determines the lifetime of IPv6 datagram
a) Hop limit
b) TTL
c) Next header
d) Type of traffic
a) Hop limit
b) TTL
c) Next header
d) Type of traffic
...
Answer is a)
8. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
...
Answer is d)
9.Dual-stack approach refers to _________
a) implementing Ipv4 with 2 stacks
b) implementing Ipv6 with 2 stacks
c) node has both IPv4 and IPv6 support
d) implementing a MAC address with 2 stacks
...
Answer is c)
10. Network addresses are a very important concept of ________
a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing
...
Answer is c)
11. In IPv4 Addresses, classful addressing is replaced with ________
a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing
...
Answer is c)
11. In IPv4 Addresses, classful addressing is replaced with ________
a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
...
Answer is a)
12. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
...
Answer is b)
13. Which of these is not applicable for IP protocol?
a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting
...
Answer is b)
14. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting
...
Answer is b)
14. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
...
Answer is c)
15. Which of the following is not applicable for IP?
a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling conventions
...
Answer is a)
16. In a network with 25 computers, which topology would require the most
extensive cabling?
(a) Star
(b) Mesh
(c) Bus
(d) None of these
extensive cabling?
(a) Star
(b) Mesh
(c) Bus
(d) None of these
...
Answer is b)
17. Dual-stack approach refers to _________
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) Implementing a MAC address with 2 stacks
...
Answer is c)
18. Which organization has authority over interstate and international commerce in the communications field?
a. ITU-T
b. IEEE
c. ISO
d. FCC
...
Answer is d)
19. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
...
Answer is b)
20. The information to be communicated in a data communications system is the ________
a. Medium
b. Protocol
c. Transmission
d. Message
...
Answer is d)
21. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
...
Answer is a)
22. Frequency of failure and network recovery time after a failure are measures of the
_______ of a network.
a. Performance
b. Security
c. Reliability
d. Feasibility
_______ of a network.
a. Performance
b. Security
c. Reliability
d. Feasibility
...
Answer is c)
23. A link local address of local addresses is used in an _______
a) Isolated router
b) Isolated mask
c) Isolated subnet
d) Isolated net
...
Answer is c)
24. . A few leftmost bits in each address of IPv6 address define its category is called ________
a) Prefix type
b) Postfix type
c) Reserved type
d) Local type
...
Answer is a)
25. An unauthorized user is a network _______ issue.
a. Performance
b. Reliability
c. Security
d. All of the above
...
Answer is c)
26. . A television broadcast is an example of _______ transmission.
a. Half-duplex
b. Full-duplex
c. Simplex
d. Automatic
a. Performance
b. Reliability
c. Security
d. All of the above
...
Answer is c)
26. . A television broadcast is an example of _______ transmission.
a. Half-duplex
b. Full-duplex
c. Simplex
d. Automatic
...
Answer is c)
27. Mail services are available to network users through the _______ layer.
a. Data link
b. Physical
c. Application
d. Transport
...
Answer is c)
28. In IPv6 addresses, addresses that start with eight 0s are called ________
a) Unicast addresses
b) Multicast addresses
c) Any cast addresses
d) Reserved addresses
...
Answer is d)
29. Which statement(s) about IPv6 addresses are true?
a) Leading zeros are required
b) Two colons (::) are used to represent successive hexadecimal fields of zeros
c) Two colons (::) are used to separate fields
d) A single interface cannot have multiple IPv6 addresses of different types
a) Unicast addresses
b) Multicast addresses
c) Any cast addresses
d) Reserved addresses
...
Answer is d)
29. Which statement(s) about IPv6 addresses are true?
a) Leading zeros are required
b) Two colons (::) are used to represent successive hexadecimal fields of zeros
c) Two colons (::) are used to separate fields
d) A single interface cannot have multiple IPv6 addresses of different types
...
Answer is b)
30. When was IPv6 launched?
a) June 2, 2012
b) June 4, 2012
c) June 5, 2012
d) June 6, 2012
...
Answer is d)
0 Comments