Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
Working of the WAN generally involves?
Which of the following is used for modulation and demodulation?
In file transfer protocol, data transfer can be done in ______
What is the other name of a LAN card?
In FTP protocol, client contacts server using ____ as the transport protocol.
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is
These are the features present in IPv4 but not in IPv6.
Which field helps to check rearrangement of the fragments?
If the value in protocol field is 17, the transport layer protocol used is ____
The conditional GET mechanism
Which of the following is present in both an HTTP request line and a status line?
Which of the following is not applicable for IP?
Which of the following field in IPv4 datagram is not related to fragmentation?
The TTL field has value 10. How many routers (max) can process this datagram?
Fragmentation has following demerits
In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
The header length of an IPv6 datagram is _____.
Which of the following is not correct?
The HTTP response message leaves out the requested object when _____ method is used
Find the oddly matched HTTP status codes
The values GET, POST, HEAD etc are specified in ____ of HTTP message
The first line of HTTP request message is called ____
In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
The HTTP request message is sent in ____ part of three-way handshake.
The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______
Find the FTP reply whose message is wrongly matched
The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is
Identify the incorrect statement
When the sender and the receiver of an email are on different systems, we need only ______ .
User agent does not support this
What is on-demand mail relay (ODMR)?
A SMTP session may include
In SMTP, the command to write receivers mail address is written with this command
A session may include
Which one of the following protocol is used to receive mail messages?
Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
What is DHCP snooping?
DHCP client and servers on the same subnet communicate via
The DHCP server can provide the _______ of the IP addresses.
DHCP uses UDP port ____ for sending data to the server.
Voice privacy in GSM cellular telephone protocol is provided by
IPSec is designed to provide the security at the
An attempt to make a computer resource unavailable to its intended users is called
In tunnel mode IPsec protects the