Compute Science (M.Sc)

Q: Which one of the following protocol can be used for login to a shell on a remote host except SSH?

(a) :  telnet
(b) :  rlogin
(c) :  both (a) and (b)
(d) :  none of the mentioned
(e) :  None of the above
Answer:  both (a) and (b)
Explanation:  SSH is more secured then telnet and rlogin.

Q: Which command displays the configuration register setting?

(a) :  show ip route
(b) :  show boot version
(c) :  show version
(d) :  show flash
(e) :  None of the above
Answer:  show version
Explanation:  The show version command provides you with the current configuration register setting.

Q: MAC address is of

(a) :   24 bits
(b) :   36 bits
(c) :   42 bits
(d) :   48 bits
(e) :  None of the above
Answer:   48 bits
Explanation:  

Q: Codes consisting of light and dark marks which may be optically read is known as

(a) :  Mnemonics
(b) :  Bar code
(c) :  Decoder
(d) :  All of the above
(e) :  None
Answer:  Bar code
Explanation:  

Q: Dual-stack approach refers to

(a) :   Implementing Ipv4 with 2 stacks
(b) :   Implementing Ipv6 with 2 stacks
(c) :  Node has both IPv4 and IPv6 support
(d) :   None of the mentioned
(e) :  None of the above
Answer:  Node has both IPv4 and IPv6 support
Explanation:  

Register now to view all Question's.

Sign in OR Sign Up


Back to top