According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?
1. Well-known ports
2. Registered ports
3. Registered ports
4.Static ports
If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
1. 255.255.255.252
2.255.255.255.255
3. 255.255.255.240
4.255.255.255.248
In IPv4 Addresses, classful addressing is replaced with ________
1. Classless Addressing
2.Classful Addressing
3.Classful Advertising
4.Classless Advertising
Internet Control Message Protocol (ICMP) has been designed to compensate _____
1.Error-reporting
2.Error-correction
3.Host and management queries
4.all of the mentioned
The TTL field has value 10. How many routers (max) can process this datagram?
1.11
2. 5
3.10
4.1
Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
1.172.16.10.255
2.255.255.255.255
3.172.16.255.255
4.172.255.255.255
Dual-stack approach refers to _________
1. implementing Ipv4 with 2 stacks
2.implementing Ipv6 with 2 stacks
3.node has both IPv4 and IPv6 support
4.implementing a MAC address with 2 stacks
During debugging, we can use the ____________ program to find if a host is alive and responding.
1. traceroute
2.shell
3.ping
4.Java
During error reporting, ICMP always reports error messages to ________
1.Destination
2. Source
3.Next router
4. Previous router
First address in a block is used as network address that represents the ________
1. Class Network
2.Entity
3. Organization
4.Codes
Header size of the ICMP message is _________
1. 8-bytes
2.8-bits
3.16-bytes
4.16-bits
ICMP error message will not be generated for a datagram having a special address such as _______
1.127.0.0.0
2.12.1.2
3.11.1
4.127
If the value in protocol field is 17, the transport layer protocol used is _______
1.TCP
2.UDP
3.ICMP
4.IGMP
In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ________
1.10101111 10100011
2. 01010000 01011100
3.10101111 01011100
4. 01010000 10100011
In case of time exceeded error, when the datagram visits a router, the value of time to live field is ______
1.Remains constant
2.Decremented by 2
3. Incremented by 1
4. Decremented by 1
In classful addressing, a large part of available addresses are ________
1. Organized
2.Blocked
3. Wasted
4.Communicated
In classless addressing, there are no classes but addresses are still granted in ______
1. IPs
2. Blocks
3.Codes
4.Sizes
In process-to-process delivery, two processes communicate in which of the following methods?
1.Client/Server
2.Source/Destination
3.Message Transfer
4.Peer to Peer
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
1.Fragmentation field
2.Fast-switching
3.ToS field
4.Option field
In transport layer, Multiplexing is done at _______
1.Channel
2.Receiver site
3.Sender site
4. Packet
In windows _____ can be used to trace the route of the packet from the source to the destination.
1.traceroute
2.tracert
3.ping
4.locater
IPv6 does not use _________ type of address.
1.broadcast
2.multicast
3. anycast
4. unicast
Multiple processes on destinations at transport layer are identified by _________
1. Mac address
2.Port number
3.Host number
4.Host address
Network addresses are a very important concept of ________
1.Routing
2.Mask
3.IP Addressing
4. Classless Addressing
Range of port numbers in Internet model is _______
1.0 and 32,765(8-bit)
2.0 and 32,765(16-bit)
3. 0 and 65,535(32-bit)
4.0 and 65,535(16-bit)
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________
1.Use dual-stack approach
2.Tunneling
3.No solution
4.Replace the system
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
1.96 to 127
2.0 to 63
3.80 to 95
4.64 to 79
The combination of an IP address and port number is called as ________
1.Socket address
2. Port address
3.MAC address
4.Host address
The combination of _________ and __________ is often termed the local address of the local portion of the IP address.
1. Network number and host number
2. Network number and subnet number
3. Subnet number and host number
4. Host number
The data field cannot carry which of the following?
1.TCP segment
2.UDP segment
3.ICMP messages
4. SMTP messages
The header length of an IPv6 datagram is _______
1.10bytes
2.25bytes
3.30bytes
4.40bytes
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______
1. Delivery of packets
2.Error correction
3. Multiplexing
4.Demultiplexing
The size of an IP address in IPv6 is ______
1.4 bytes
2.128 bits
3.8 bytes
4. 100 bits
The source-quench message in ICMP was designed to add a kind of _______ to the IP.
1.error control
2. flow control
3. router control
4.switch control
The _________ field determines the lifetime of IPv6 datagram
1.Hop limit
2. TTL
3.Next header
4.Type of traffic
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
1.Half-trip time
2.Round-trip time
3. Travel time for the next router
4.Time to reach the destination/source
What should be the flag value to indicate the last fragment?
1.0
2.1
3.TTl value
4. Protocol field value
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____ message back to the source host that initiated the datagram.
1. Destination unreachable
2.Source quench
3.Router error
4. Time exceeded
Which among the following features is present in IPv6 but not in IPv4?
1.Fragmentation
2.Header checksum
3.Options
4.Anycast address
Which field helps to check rearrangement of the fragments?
1.offset
2.flag
3. ttl
4.identifer
Which layer is responsible for process-to-process delivery?
1.Physical layer
2.Network layer
3.Transport layer
4.application layer
Which of the following demerits does Fragmentation have?
1.complicates routers
2. open to DOS attack
3.overlapping of fragments.
4. All of the mentioned
Which of the following field in IPv4 datagram is not related to fragmentation?
1. Flags
2.Offset
3. TOS
4.Identifier
Which of the following is false with respect to Connectionless service of transport layer protocol?
1. Packets are not numbered
2.Packets are not delayed
3.No acknowledgement
4.Packet may arrive out of sequence
Which of these is not a type of error-reporting message?
1. Destination unreachable
2.Source quench
3.Router error
4. Time exceeded
Which of these is not applicable for IP protocol?
1. is connectionless
2.offer reliable service
3.offer unreliable service
4.does not offer error reporting
Which of this is not a class of IP address?
1.Class E
2.Class C
3.Class D
4. Class F
You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?
1.Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
2.Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
3. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
4.Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
_____ implies that all subnets obtained from the same subnet mask.
1. Static subnetting
2.Dynamic subnetting
3.Variable length subnetting
4. Dynamic length subnetting
______ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.
1.FDDI
2.FDDT
3.FDDR
4.FOTR