Recent questions tagged computer-networks

5 votes
4 answers
2671
In Ethernet, the source address field in the MAC frame is the _______ address.original sender's physicalprevious station's physicalnext destination's physicaloriginal sen...
7 votes
2 answers
2672
The subnet mask $255.255.255.192$extends the network portion to $16$ bitsextends the network portion to $26$ bitsextends the network portion to $36$ bitshas no effect on ...
10 votes
5 answers
2673
When a host on network A sends a message to a host on network B, which address does the router look at?PortIPPhysicalSubnet mask
5 votes
3 answers
2674
$\textsf{IEEE 802.11}$ is standard forEthernetBluetoothBroadband WirelessWireless LANs
8 votes
5 answers
2675
Range of IP Address from $224.0.0.0$ to $239.255.255.255$ areReserved for loopbackReserved for broadcastUsed for multicast packetsReserved for future addressing
8 votes
2 answers
2676
Hashed message is signed by a sender usinghis public keyhis private keyreceiver’s public keyreceiver’s private key
5 votes
1 answer
2677
The standard for certificates used on internet is$\textsf{X.25}$$\textsf{X.301}$$\textsf{X.409}$$\textsf{X.509}$
5 votes
2 answers
2678
SSL is not responsible forMutual authentication of client & serverSecret communicationData Integrity protectionError detection and correction
7 votes
2 answers
2679
Silly Window Syndrome is related toError during transmissionFile transfer protocolDegrade in TCP performanceInterface problem
11 votes
3 answers
2680
If there are five routers and six networks in intranet using link state routing, how many routing tables are there?$1$$5$$6$$11$
7 votes
2 answers
2681
Phase transition for each bit are used inAmplitude modulationCarrier modulationManchester encodingNRZ encoding
8 votes
2 answers
2682
An Ethernet hubfunctions as a repeaterconnects to a digital PBXconnects to a token-ring networkfunctions as a gateway
0 votes
1 answer
2683
3 votes
2 answers
2684
Match the following $:$$\begin{array}{cIcI} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Physical layer} & \text{i.} & \text{Allow resources to net...
1 votes
2 answers
2686
4 votes
2 answers
2687
0 votes
2 answers
2688
1 votes
2 answers
2689
0 votes
1 answer
2691
0 votes
3 answers
2692
5 votes
5 answers
2693
What is the primary purpose of a VLAN?Demonstrating the proper layout for a networkSimulating a networkTo create a virtual private networkSegmenting a network inside a sw...
6 votes
2 answers
2694
5 votes
2 answers
2696
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
2 votes
2 answers
2697