Latest Banking jobs   »   IT Officer (Networking)

IT Officer (Networking)



00:00:00



1. In asymmetric key cryptography, the private key is kept by

sender
receiver
sender and receiver
all the connected devices to the network
None of these



2. SMTP is ________ protocol.

application layer
transport layer
network layer
session layer
none of the above


3. UDP is ________ protocol.

application layer
transport layer
network layer
session layer
None of the above

4. The size of IP address in IPv6 is

16 bits
32 bits
128 bits
512 bits
None of these

5. Dual-stack approach refers to

Implementing Ipv4 with 2 stacks
Implementing Ipv6 with 2 stacks
Node has both IPv4 and IPv6 support
All of the above
None of the above

6. IPv6 doesnot use ______ type of address

Broadcast
Multicast
Anycast
All of the above
None of the above



7. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero

Propogation delay
Transmission delay
Queuing delay
Processing delay
None of the above

8. Propagation delay depends on

Distance between the routers
Packet length
Transmission rate
all of the above
None of these

9. Transmission delay does not depend on

Packet length
Distance between the routers
Transmission rate
All of the above
None of these


10. Transmission control protocol is

connection oriented protocol
uses a three way handshake to establish a connection
recievs data from application as a single stream
All of the above
None of these

                                       




Leave a comment

Your email address will not be published. Required fields are marked *