MEDIUM
HSSC Clerk
IMPORTANT
Earn 100

When you will visit websites, spyware may be substantially downloaded. This is called a _____.
(a)Logic bomb
(b)Drive-by download
(c)Virus
(d)Drive-in download
(e)Spyot

52.38% studentsanswered this correctly

Important Questions on Data Communication Networking
HARD
HSSC Clerk
IMPORTANT
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: . The ISP wants to give half of this chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?

HARD
HSSC Clerk
IMPORTANT
A -layer firewall(a device that can look at all protocol heads up to the transport layer) cannot:

MEDIUM
HSSC Clerk
IMPORTANT
Consider the different activities related to email:
- : Send an email from mail client to mail server
- : Download an email from mailbox server to a mail client
- : Checking email in a web browser
Which application level protocol used in each activity?

MEDIUM
HSSC Clerk
IMPORTANT
HTML (Hyper-text Markup Language) has some language element which permit certain actions other than describing the structure of the web document. Which one of the following actions is not supported by pure HTML (without any server or client side scripting) pages?

HARD
HSSC Clerk
IMPORTANT
Suppose computers A and B have IP addresses and respectively and they both use the same netmask N. Which of the values of N given below should not be used if A and B should belong to the same network?

MEDIUM
HSSC Clerk
IMPORTANT
What is the maximum size of data that the application layer can pass on to the TCP layer below?

MEDIUM
HSSC Clerk
IMPORTANT
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window:

MEDIUM
HSSC Clerk
IMPORTANT
If a class B network on the Internet has a subnet mask of , what is the maximum number of hosts per subnet?
