According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?
1. Well-known ports
2. Registered ports
3. Registered ports
4.Static ports
Posted Date:-2021-12-27 23:19:56
If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
1. 255.255.255.252
2.255.255.255.255
3. 255.255.255.240
4.255.255.255.248
Posted Date:-2021-12-27 23:30:29
In IPv4 Addresses, classful addressing is replaced with ________
1. Classless Addressing
2.Classful Addressing
3.Classful Advertising
4.Classless Advertising
Posted Date:-2021-12-27 23:09:58
Internet Control Message Protocol (ICMP) has been designed to compensate _____
1.Error-reporting
2.Error-correction
3.Host and management queries
4.all of the mentioned
Posted Date:-2021-12-27 23:23:03
The TTL field has value 10. How many routers (max) can process this datagram?
1.11
2. 5
3.10
4.1
Posted Date:-2021-12-27 23:04:13
Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
1.172.16.10.255
2.255.255.255.255
3.172.16.255.255
4.172.255.255.255
Posted Date:-2021-12-27 23:29:35
_____ implies that all subnets obtained from the same subnet mask.
1. Static subnetting
2.Dynamic subnetting
3.Variable length subnetting
4. Dynamic length subnetting
Posted Date:-2021-12-27 23:32:05
______ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.
1.FDDI
2.FDDT
3.FDDR
4.FOTR
Posted Date:-2021-12-27 23:32:53
Dual-stack approach refers to _________
1. implementing Ipv4 with 2 stacks
2.implementing Ipv6 with 2 stacks
3.node has both IPv4 and IPv6 support
4.implementing a MAC address with 2 stacks
Posted Date:-2021-12-27 23:15:05
During debugging, we can use the ____________ program to find if a host is alive and responding.
1. traceroute
2.shell
3.ping
4.Java
Posted Date:-2021-12-27 23:26:53
During error reporting, ICMP always reports error messages to ________
1.Destination
2. Source
3.Next router
4. Previous router
Posted Date:-2021-12-27 23:23:51
First address in a block is used as network address that represents the ________
1. Class Network
2.Entity
3. Organization
4.Codes
Posted Date:-2021-12-27 23:10:24
Header size of the ICMP message is _________
1. 8-bytes
2.8-bits
3.16-bytes
4.16-bits
Posted Date:-2021-12-27 23:23:32
ICMP error message will not be generated for a datagram having a special address such as _______
1.127.0.0.0
2.12.1.2
3.11.1
4.127
Posted Date:-2021-12-27 23:24:37
If the value in protocol field is 17, the transport layer protocol used is _______
1.TCP
2.UDP
3.ICMP
4.IGMP
Posted Date:-2021-12-27 23:04:54
In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ________
1.10101111 10100011
2. 01010000 01011100
3.10101111 01011100
4. 01010000 10100011
Posted Date:-2021-12-27 23:27:49
In case of time exceeded error, when the datagram visits a router, the value of time to live field is ______
1.Remains constant
2.Decremented by 2
3. Incremented by 1
4. Decremented by 1
Posted Date:-2021-12-27 23:26:02
In classful addressing, a large part of available addresses are ________
1. Organized
2.Blocked
3. Wasted
4.Communicated
Posted Date:-2021-12-27 23:10:49
In classless addressing, there are no classes but addresses are still granted in ______
1. IPs
2. Blocks
3.Codes
4.Sizes
Posted Date:-2021-12-27 23:09:31
In process-to-process delivery, two processes communicate in which of the following methods?
1.Client/Server
2.Source/Destination
3.Message Transfer
4.Peer to Peer
Posted Date:-2021-12-27 23:18:23
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
1.Fragmentation field
2.Fast-switching
3.ToS field
4.Option field
Posted Date:-2021-12-27 23:13:27
In transport layer, Multiplexing is done at _______
1.Channel
2.Receiver site
3.Sender site
4. Packet
Posted Date:-2021-12-27 23:21:15
In windows _____ can be used to trace the route of the packet from the source to the destination.
1.traceroute
2.tracert
3.ping
4.locater
Posted Date:-2021-12-27 23:27:20
IPv6 does not use _________ type of address.
1.broadcast
2.multicast
3. anycast
4. unicast
Posted Date:-2021-12-27 23:13:48
Multiple processes on destinations at transport layer are identified by _________
1. Mac address
2.Port number
3.Host number
4.Host address
Posted Date:-2021-12-27 23:18:48
Network addresses are a very important concept of ________
1.Routing
2.Mask
3.IP Addressing
4. Classless Addressing
Posted Date:-2021-12-27 23:11:25
Range of port numbers in Internet model is _______
1.0 and 32,765(8-bit)
2.0 and 32,765(16-bit)
3. 0 and 65,535(32-bit)
4.0 and 65,535(16-bit)
Posted Date:-2021-12-27 23:19:28
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________
1.Use dual-stack approach
2.Tunneling
3.No solution
4.Replace the system
Posted Date:-2021-12-27 23:15:28
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
1.96 to 127
2.0 to 63
3.80 to 95
4.64 to 79
Posted Date:-2021-12-27 23:15:52
The _________ field determines the lifetime of IPv6 datagram
1.Hop limit
2. TTL
3.Next header
4.Type of traffic
Posted Date:-2021-12-27 23:14:40
The combination of _________ and __________ is often termed the local address of the local portion of the IP address.
1. Network number and host number
2. Network number and subnet number
3. Subnet number and host number
4. Host number
Posted Date:-2021-12-27 23:31:19
The combination of an IP address and port number is called as ________
1.Socket address
2. Port address
3.MAC address
4.Host address
Posted Date:-2021-12-27 23:20:22
The data field cannot carry which of the following?
1.TCP segment
2.UDP segment
3.ICMP messages
4. SMTP messages
Posted Date:-2021-12-27 23:05:15
The header length of an IPv6 datagram is _______
1.10bytes
2.25bytes
3.30bytes
4.40bytes
Posted Date:-2021-12-27 23:13:03
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______
1. Delivery of packets
2.Error correction
3. Multiplexing
4.Demultiplexing
Posted Date:-2021-12-27 23:21:49
The size of an IP address in IPv6 is ______
1.4 bytes
2.128 bits
3.8 bytes
4. 100 bits
Posted Date:-2021-12-27 23:12:36
The source-quench message in ICMP was designed to add a kind of _______ to the IP.
1.error control
2. flow control
3. router control
4.switch control
Posted Date:-2021-12-27 23:25:35
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
1.Half-trip time
2.Round-trip time
3. Travel time for the next router
4.Time to reach the destination/source
Posted Date:-2021-12-27 23:26:27
What should be the flag value to indicate the last fragment?
1.0
2.1
3.TTl value
4. Protocol field value
Posted Date:-2021-12-27 23:07:07
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____ message back to the source host that initiated the datagram.
1. Destination unreachable
2.Source quench
3.Router error
4. Time exceeded
Posted Date:-2021-12-27 23:25:03
Which among the following features is present in IPv6 but not in IPv4?
1.Fragmentation
2.Header checksum
3.Options
4.Anycast address
Posted Date:-2021-12-27 23:14:17
Which field helps to check rearrangement of the fragments?
1.offset
2.flag
3. ttl
4.identifer
Posted Date:-2021-12-27 23:08:21
Which layer is responsible for process-to-process delivery?
1.Physical layer
2.Network layer
3.Transport layer
4.application layer
Posted Date:-2021-12-27 23:17:58
Which of the following demerits does Fragmentation have?
1.complicates routers
2. open to DOS attack
3.overlapping of fragments.
4. All of the mentioned
Posted Date:-2021-12-27 23:08:00
Which of the following field in IPv4 datagram is not related to fragmentation?
1. Flags
2.Offset
3. TOS
4.Identifier
Posted Date:-2021-12-27 23:03:43
Which of the following is false with respect to Connectionless service of transport layer protocol?
1. Packets are not numbered
2.Packets are not delayed
3.No acknowledgement
4.Packet may arrive out of sequence
Posted Date:-2021-12-27 23:20:49
Which of these is not a type of error-reporting message?
1. Destination unreachable
2.Source quench
3.Router error
4. Time exceeded
Posted Date:-2021-12-27 23:24:14
Which of these is not applicable for IP protocol?
1. is connectionless
2.offer reliable service
3.offer unreliable service
4.does not offer error reporting
Posted Date:-2021-12-27 23:07:31
Which of this is not a class of IP address?
1.Class E
2.Class C
3.Class D
4. Class F
Posted Date:-2021-12-27 23:11:56
You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?
1.Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
2.Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
3. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
4.Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
Posted Date:-2021-12-27 23:30:01