Computer Networks (GATE Computer Science): Questions 55 - 60 of 169

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 913 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 450.00 or

Question number: 55

» Computer Networks » ISO-OSI Stack

MCQ▾

Question

Which layer functions as liaison between user support layers and network support layers?

Choices

Choice (4) Response
a.

Transport layer

b.

Network layer

c.

Physical layer

d. None of the above

Question number: 56

» Computer Networks » IP(v4)

MCQ▾

Question

Insecurity (IPSec) is a collection of ________.

Choices

Choice (4) Response
a.

Protocol

b.

HTTP

c.

HTML

d. Question does not provide sufficient data or is vague

Question number: 57

» Computer Networks » Application Layer Protocols

MCQ▾

Question

________ is fixed-content documents that are created and stored in a server which the client can get only a copy of the document.

Choices

Choice (4) Response
a.

Dynamic documents

b.

Documents

c.

Static documents

d. Question does not provide sufficient data or is vague

Question number: 58

» Computer Networks » IP(v4)

MCQ▾

Question

Change the following IPv4 addresses from dotted-decimal notation to binary notation is

110.56. 44.78

Choices

Choice (4) Response
a.

01101111 00111000 00101101 01001110

b.

01101110 00111000 00101100 01001110

c.

11000001111100000111100000111111

d. All of the above

Question number: 59

» Computer Networks » Flow and Error Control Techniques

MCQ▾

Question

Real-time Transport Control Protocol provides ________, quality of data Control and feedback to the sources.

Choices

Choice (4) Response
a.

Flow control

b.

Data control

c.

Control

d. All of the above

Question number: 60

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

________ there is no substitution of characters but only change of their locations change.

Choices

Choice (4) Response
a.

A transposition cipher

b.

Substitution cipher

c.

Mono alphabetic cipher

d. None of the above

Sign In