(A) 32,48
(B) 24,32
(C) 32,64
(D) 32,128
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
(A) True
(B) False
Protocol addresses are abstractions provided by?
(A) Hardware
(B) Software
(C) Operating System
(D) Internet
Router that decrements TTL to __ sends ICMP time exceeded message, with router address as source address.
(A) 0
(B) 1
(C) 2
(D) 3
__ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
(A) Flood and Prune
(B) Configuration and Tunneling
(C) Core Based Discovery
(D) None of the above
__ uses distance vector approach to define routing.
(A) OSPF
(B) BGP
(C) RIP
(D) None of the above
__ is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
(A) UDP
(B) TCP
(C) IP
(D) None of the above
__ protocols of TCP/IP layering model specify how to ensure reliable transfer.
(A) Network interface layer
(B) Physical layer
(C) Internet layer
(D) Transport layer