Computer-Networks (Set 5)
Computer-Networks (Set 5)
Computer-Networks (Set 5)
5 of 10 sets
401. Which one of the following protocol is used to receive mail messages?
A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Answer:D
411. If a server has no clue about where to find the address for a hostname then
_______
A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer:A
417. Which standard TCP port is assigned for contacting SSH servers?
A. port 21
B. port 22
C. port 23
D. port 24
Answer:B
418. Which one of the following is a file transfer protocol using SSH?
A. scp
B. sftp
C. rsync
D. all of the mentioned
Answer:D
420. Which one of the following feature was present in SSH protocol, version 1?
A. password changing
427. DHCP uses UDP port _________ for sending data to the server.
A. 66
B. 67
C. 68
D. 69
Answer:B
428. DHCP client and servers on the same subnet communicate via _________
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer:A
437. Full duplex mode increases the capacity of each domain by ________
A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer:A
442. SNMP is the framework for managing devices in an internet using the ______
A. tcp/ip protocol
B. udp
C. smtp
D. none
Answer:A
457. TCP groups a number of bytes together into a packet called _______
A. packet
B. buffer
C. segment
D. stack
Answer:C
463. What allows TCP to detect lost segments and in turn recover from that loss?
A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Answer:B
468. Port number used by Network Time Protocol (NTP) with UDP is ________
A. 161
B. 123
C. 162
D. 124
Answer:B
470. The port number is “ephemeral port number”, if the source host is _______
A. ntp
471. “Total length” field in UDP packet header is the length of _________
A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer:D
472. Which is the correct expression for the length of UDP datagram?
A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer:A
473. The ______ field is used to detect errors over the entire user datagram.
A. udp header
B. checksum
C. source port
D. destination port
Answer:B
483. The packet sent by a node to the source to inform it of congestion is called
_______
A. explicit
B. discard
C. choke
D. backpressure
Answer:C
487. Delay of the resource allocated during setup phase during data transfer is
________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer:C
488. Delay of the resource allocated on demand during data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer:D
489. In data transfer phase, how many columns does the table contain?
A. 1
B. 2
C. 3
D. 4
Answer:D