71. | Frame boundaries are recognized and created by .................... |
a. | Application layer |
b. | Data Link layer |
c. | Session layer |
d. | Network layer |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).Session layer
|
72. | Token Management is the function of .................... |
a. | Application layer |
b. | Data Link layer |
c. | Session layer |
d. | Network layer |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).Network layer
|
73. | The function of Physical Layer? |
a. | Error correction and Detection |
b. | Piggybacking |
c. | Flow Control |
d. | Determine number of volts to represent 1 or 0 |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).Determine number of volts to represent 1 or 0
|
74. | As the data packet moves from the lower to the upper layers then headers are? |
a. | added |
b. | subtracted |
c. | rearranged |
d. | modified |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).added
|
75. | In OSI network architecture, the routing is performed by .................. |
a. | network layer |
b. | data link layer |
c. | transport layer |
d. | session layer |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).network layer
|
76. | How many OSI layers are covered in the X.25 standard? |
a. | Two |
b. | Three |
c. | Seven |
d. | Six |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Three
|
77. | Layer one of the OSI model is ................. |
a. | physical layer |
b. | link layer |
c. | transport layer |
d. | internet work layer |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).physical layer
|
78. | The X.25 standard specifies a ............... |
a. | technique for start-stop data |
b. | technique for dial access |
c. | DTE/DCE interface |
d. | None of above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).DTE/DCE interface
|
79. | Which of the following are session layer check points? |
a. | allow just a portion of a file to be resent |
b. | detect and recover errors |
c. | control the addition of headers |
d. | are involved in dialog control |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).allow just a portion of a file to be resent
|
80. | Which of the following technique is used for encapsulation? |
a. | one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size |
b. | a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame |
c. | a technique used in best-effort delivery systems to avoid endlessly looping packets |
d. | all of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
|