Choose a topic to test your knowledge and improve your MCA skills
Which of the following field in IPv4 datagram is not related to fragmentation?
The TTL field has value 10. How many routers (max) can process this datagram?
If the value in protocol field is 17, the transport layer protocol used is _______
The data field cannot carry which of the following?
What should be the flag value to indicate the last fragment?
Which of these is not applicable for IP protocol?
Which of the following demerits does Fragmentation have?
Which field helps to check rearrangement of the fragments?
In classless addressing, there are no classes but addresses are still granted in ______
In IPv4 Addresses, classful addressing is replaced with ________
First address in a block is used as network address that represents the ________
In classful addressing, a large part of available addresses are ________
Network addresses are a very important concept of ________
Which of this is not a class of IP address?
The size of an IP address in IPv6 is ______
The header length of an IPv6 datagram is _______
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
IPv6 does not use _________ type of address.
Which among the following features is present in IPv6 but not in IPv4?
The _________ field determines the lifetime of IPv6 datagram
Dual-stack approach refers to _________
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
Which layer is responsible for process-to-process delivery?
In process-to-process delivery, two processes communicate in which of the following methods?
Multiple processes on destinations at transport layer are identified by _________
Range of port numbers in Internet model is _______
According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?
The combination of an IP address and port number is called as ________
Which of the following is false with respect to Connectionless service of transport layer protocol?
In transport layer, Multiplexing is done at _______
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______
Internet Control Message Protocol (ICMP) has been designed to compensate _____
Header size of the ICMP message is _________
During error reporting, ICMP always reports error messages to ________
Which of these is not a type of error-reporting message?
ICMP error message will not be generated for a datagram having a special address such as _______
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____ message back to the source host that initiated the datagram.
The source-quench message in ICMP was designed to add a kind of _______ to the IP.
In case of time exceeded error, when the datagram visits a router, the value of time to live field is ______
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
During debugging, we can use the ____________ program to find if a host is alive and responding.
In windows _____ can be used to trace the route of the packet from the source to the destination.
In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ________
Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?
If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
The combination of _________ and __________ is often termed the local address of the local portion of the IP address.
_____ implies that all subnets obtained from the same subnet mask.
______ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.