- 1
- 2
- 3
- 4
- Next Page »
A Learning Portal from Recruitment India
A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
flooding
delta routing
hot potato routing
static routing
Answer with explanation
Answer: Option CExplanation
hot potato routing
Workspace
Which of these is a standard interface for serial data transmission?
Centronics
2
RS232C
ASCII
Answer with explanation
Answer: Option CExplanation
Explanation: The RS232C is a standard interface for serial data transmission that defines the protocol and physical interface for transmitting serial data fairly easily between associated appliances and computers.
Workspace
The network layer is concerned with __________ of data.
frames
packets
bytes
bits
Answer with explanation
Answer: Option BExplanation
Explanation: In computer networks, the data from the application layer is sent to the transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits.
Workspace
Which of the following technique is used for Time-To-Line (TTL)?
a technique used in best-effort delivery system to avoid endlessly looping packets.
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
All of the above
Answer with explanation
Answer: Option AExplanation
a technique used in best-effort delivery system to avoid endlessly looping packets.
Workspace
What is the purpose of Spanning Tree Protocol in a switched LAN?
To provide a mechanism for network monitoring in switched environments
To prevent routing loops in networks with redundant paths
To prevent switching loops in networks with redundant switched paths
To manage the VLAN database across multiple switches.
Answer with explanation
Answer: Option CExplanation
The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.
Workspace
What is split horizon?
Information about a route should not be sent back in the direction from which the original update came.
It splits the traffic when you have a large bus (horizon) physical network
It holds the regular updates from broadcasting to a downed link.
It prevents regular update messages from reinstating a route that has gone down.
Answer with explanation
Answer: Option AExplanation
A split horizon will not advertise a route back to the same router it learned the route from.
Workspace
Which of the following commands displays the configurable parameters and statistics of all interfaces on a router?
show running-config
show startup-config
show interfaces
show versions
Answer with explanation
Answer: Option CExplanation
With the show interfaces command, you can view the configurable parameters, get statistics for the interfaces on the router, verify if the interfaces are shut down, and see the IP address of each interface.
Workspace
The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?
Application
Host-to-Host
Internet
Network Access
Answer with explanation
Answer: Option CExplanation
The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.
Workspace
If you wanted to delete the configuration stored in NVRAM, what would you type?
erase nvram
erase startup
delete nvram
erase running
Answer with explanation
Answer: Option BExplanation
The command erase startup-config deletes the configuration stored in NVRAM.
Workspace
In the network HTTP resources are located by
uniform resource identifier
unique resource locator
unique resource identifier
union resource locator
Answer with explanation
Answer: Option AExplanation
The Uniform Resource Identifier is a name and locator for the resource to be located by the HTTP. The URLs and URNs are derived through the identifier.
Workspace
Which protocol is a signaling communication protocol used for controlling multimedia communication sessions?
session initiation protocol
session modelling protocol
session maintenance protocol
resource reservation protocol
Answer with explanation
Answer: Option AExplanation
SIP is a signaling protocol in which its function includes initiating, maintaining and terminating real time sessions. SIP is used for signaling and controlling multimedia sessions.
Workspace
Which of the following is an application layer service?
Network virtual terminal
File transfer, access, and management
Mail service
All of the mentioned
Answer with explanation
Answer: Option DExplanation
The services provided by the application layer are network virtual terminal, file transfer, access and management, mail services, directory services, various file and data operations.
Workspace
A wireless network interface controller can work in _______
infrastructure mode
ad-hoc mode
both infrastructure mode and ad-hoc mode
WDS mode
Answer with explanation
Answer: Option CExplanation
A wireless network interface controller works on the physical layer and the data link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
Workspace
Packets in datagram switching are referred to as ________
Switches
Segments
Datagrams
Data-packets
Answer with explanation
Answer: Option CExplanation
As the name suggests, in datagram switching packets are called as datagram. Each datagram/packet is treated as an individual entity and routed independently through the network.
Workspace
Which of the following is true of signature-based IDSes?
They alert administrators to deviations from “normal” traffic behavior
They identify previously unknown attacks
The technology is mature and reliable enough to use on production networks
They scan network traffic or packets to identify matches with attack-definition files
Answer with explanation
Answer: Option DExplanation
They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. They then scan network traffic for packets that match the signatures, and then raise alerts to security administrators.
Workspace
Which one of the following events is not possible in a wireless LAN?
collision detection
acknowledgement of data frames
multi-mode data transmission
connection to wired networks
Answer with explanation
Answer: Option AExplanation
Collision detection is not possible in wireless LAN with no extensions. Collision detection techniques for multiple access like CSMA/CD are used to detect collisions in Wireless LANs.
Workspace
Which of the following is false with respect to the datagram networks?
Number of flows of packets are not limited
Packets may not be in order at the destination
Path is not reserved
Delay is the same for all packets in a flow
Answer with explanation
Answer: Option DExplanation
The delay of each packet in a datagram network is different as each packet might take a different route to the destination. This happens because there is no pre-decided route for the packets.
Workspace
The File Transfer Protocol is built on ______________
data centric architecture
service oriented architecture
client server architecture
connection oriented architecture
Answer with explanation
Answer: Option CExplanation
The FTP connection includes a Server and a Client which wish to share files. The server can have multiple clients at the same time while the client communicates with only one server at a time.
Workspace
Which of the following is present in both an HTTP request line and a status line?
HTTP version number
URL
Method
None of the mentioned
Answer with explanation
Answer: Option AExplanation
Status line is the the start line of an HTTP response. It contains the information such as the protocol version, a status text, status code.
Workspace
Which one of the following is an internet standard protocol for managing devices on IP network?
dynamic host configuration protocol
simple network management protocol
internet message access protocol
media gateway protocol
Answer with explanation
Answer: Option BExplanation
SNMP is a set of protocols for network management and monitoring. This protocol is included in the application layer. SNMP uses 7 protocol data units.
Workspace
Application developer has permission to decide the following on transport layer side?
Transport layer protocol
Maximum buffer size
Both Transport layer protocol and Maximum buffer size
None of the mentioned
Answer with explanation
Answer: Option CExplanation
Application layer provides the interface between applications and the network. So application developer can decide what transport layer to use and what should be its maximum buffer size.
Workspace