0

Data Communication

Description: DC
Number of Questions: 15
Created by:
Tags: DC Data Communication and Networks
Attempted 0/15 Correct 0 Score 0

The _____________ command in FTP protocol standard is used to copy multiple files from the remote to the local host.

  1. get

  2. mget

  3. put

  4. mput

  5. quit


Correct Option: B
Explanation:

This command in FTP protocol standard is used to copy multiple files from the remote to the local host.

The ____________ interface is one of several application programming interfaces to the communication protocols which is used by a process to request network services from the operating system.

  1. serial port

  2. parallel port

  3. USB port

  4. socket

  5. firewire port


Correct Option: D
Explanation:

This interface is one of several application programming interfaces to the communication protocols which is used by a process to request network services from the operating system.

The ____________ topology in data communication is designed with each node connected directly to a central network hub or concentrator.

  1. ring topology

  2. star topology

  3. tree topology

  4. bus topology

  5. mesh topology


Correct Option: B
Explanation:

This topology in data communication is designed with each node connected directly to a central network hub or concentrator.

The _____________ component of TCP/IP protocol consists of one or more LAN segments that are bounded by routers and use the same IP address prefix.

  1. node

  2. LAN segment

  3. subnet

  4. network

  5. router


Correct Option: C
Explanation:

This component of TCP/IP protocol consists of one or more LAN segments that are bounded by routers and use the same IP address prefix.

The first phase in data communication using circuit switching technique is

  1. data transfer

  2. termination of connection

  3. connection establishment

  4. data sharing

  5. error detection


Correct Option: C
Explanation:

This phase is the first phase in data communication using circuit switching technique.

The _______________ protocol of application layer of TCP/IP collects and exchanges network management information between a network management console and network devices, such as routers, bridges and servers.

  1. HTTP

  2. FTP

  3. SMTP

  4. SNMP

  5. RIP


Correct Option: D
Explanation:

This protocol collects and exchanges network management information between a network management console and network devices, such as routers, bridges and servers.

The ___________ network management task assumes that access to network resources is controlled and the data integrity is ensured in the course of their storage or transmission across the network.

  1. configuration management

  2. fault management

  3. security management

  4. accounting management

  5. performance management


Correct Option: C
Explanation:

This network management task assumes that access to network resources is controlled and the data integrity is ensured in the course of their storage or transmission across the network.

The ____________ core protocol of IPv4 layer resolves the internet layer address to a network interface layer address, such as a hardware address.

  1. internet protocol (IP)

  2. internet control message protocol (ICMP)

  3. address resolution protocol (ARP)

  4. internet group management protocol (IGMP)

  5. transmission control protocol (TCP)


Correct Option: C
Explanation:

This is a core protocol of IPv4 layer.

The ____________ terminal multiplexer of Synchronous Optical Network(SONET) receives an OC-N signal from which it can demultiplex and terminate any number of DSn or OC-M signals.

  1. SONET/SDH terminal multiplexer

  2. SONET/SDH add/drop multiplexer

  3. digital cross connect systems

  4. DWDM

  5. optical supervisory channel


Correct Option: B
Explanation:

This terminal multiplexer of Synchronous Optical Network(SONET) receives an OC-N signal from which it can demultiplex and terminate any number of DSN or OC-M signals.

The ____________ DHCP message format sends negative acknowledgment from server to client indicating that the clients lease has expired or that a requested IP address in incorrect.

  1. DHCPDISCOVER

  2. DHCPACK

  3. DHCPOFFER

  4. DHCPNACK

  5. DHCPRELEASE


Correct Option: D
Explanation:

This DHCP message format sends negative acknowledgment from server to client indicating that the clients' lease has expired or that a requested IP address is incorrect.

The _____________ component of Dense Wavelength Division Multiplexing(DWDM) compensates the loss in optical power while the signal travels along the fibre.

  1. DWDM terminal multiplexer

  2. optical add/drop multiplexer

  3. DWDM terminal demultiplexer

  4. intermediate line amplifier

  5. optical supervisory channel


Correct Option: D
Explanation:

This component of Dense Wavelength Division Multiplexing(DWDM) compensates the loss in optical power while the signal travels along the fibre.

The ________ POP3 command is used to retrieve the number of messages and total size of the messages.

  1. STAT

  2. RETR

  3. NOOP

  4. RSET

  5. QUIT


Correct Option: A
Explanation:

This POP3 command is used to retrieve the number of messages and total size of the messages.

The _____________ IP address allocation mechanism in DHCP protocol assigns an IP address for a limited period of time.

  1. automatic allocation

  2. manual allocation

  3. dynamic allocation

  4. client hardware address

  5. BOOTP forwarding


Correct Option: C
Explanation:

This IP address allocation mechanism in DHCP protocol assigns an IP address for a limited period of time.

In the ________________ state in IMAP4 protocol, a mailbox is successfully selected and actions can be taken against the mail within the mailbox.

  1. non authenticated

  2. authenticated

  3. selected

  4. logout

  5. waiting


Correct Option: C
Explanation:

A mailbox has been successfully selected and actions can be taken against the mail within the mailbox.

The __________ phase of link control protocol of point to point protocol specifies the policy for determining quality and provides low-level tools, such as echo request and reply.

  1. link establishment and configuration negotiation

  2. authentication

  3. link quality determination

  4. network layer protocol configuration negotiation

  5. link termination


Correct Option: C
Explanation:

This phase of link control protocol of point to point protocol specifies the policy for determining quality and provides low level tools, such as echo request and reply.

- Hide questions