B. rules for when and how processes send and respond to messages
C. types of messages exchanged
D. All of the above
Correct Answer
All of the above
Explanation
Application layer protocol defines types of messages exchanged, message format, syntax and semantics and rules for when and how processes send and respond to messages.
Correct Answer: The process that allows a network to self-repair networks problems The stations on the network notify the other stations on the ring when they are not receiving the transmissions Beaconing is used in Token ring and FDDI networks
Correct Answer: NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications NETBEUI is NetBIOS extended user interface A transport protocol designed by microsoft and IBM for the use on small subnets
Correct Answer: The most common two letter combinations are called as digrams eg th, in, er, re and an The most common three letter combinations are called as trigrams eg the, ing,and, and ion
Correct Answer: 10Base2?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments 10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment 10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling
Correct Answer: It is a sequence of IP addresses identifying the route a datagram must follow A source route may optionally be included in an IP datagram header
Correct Answer: It is using a router to answer ARP requests This will be done when the originating host believes that a destination is local, when in fact is lies beyond router
Correct Answer: It is an authentication service developed at the Massachusetts Institute of Technology Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files