________acts as source and destination for IP traffic.

A. Interface

B. Node

C. Host

D. Router

You can do it
  1. In FTP, to execute a file transfer, the user begins by _________.
  2. In Integrated services model, ________ corresponds to token bucket filter.
  3. SMTP protocol is responsible for sending email across the Internet
  4. Class C network address class supports 65,534 hosts.
  5. What is the maximum size of IP header in the UDP Datagram format?
  6. What is the code used for Interpret As Command (IAC)?
  7. Which of the following is used for testing the data-link connection in a PPP network?
  8. In an active mode if any FTP client sends the port command "PORT 192,168,0,1,4,1" then what will be…
  9. 80 is the well-known port number for the HTTP service.
  10. What can be used in the place of DNS to resolve host names to IP addresses?
  11. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain…
  12. ___________ is based on resources that are present within the Diffserv region.
  13. The network interface layer specifies how to organize data into..and Internet layer specifies the format…
  14. Which class does the IP address belong to?
  15. Which piece of equipment operates at both the data-link and network layers?
  16. Which of the following is also known as IP masquerading?
  17. Which of the following is used for establishing, configuring, and testing the data-link Link Control…
  18. TCP protocol is responsible for connection-oriented communication
  19. UDP datagram has a header, which is of ________.
  20. 25 is used by SMTP
  21. Which of the following pieces of equipment will receive a packet from one port and forward that packet…
  22. Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?
  23. Destination physical address in ARP request is a .address.
  24. What is the address identified when socket is available at each end of TCP?
  25. What is the range of multicast addressing?
  26. A modem is a card within a PC that converts the ... the computer produces to .. that can pass over telephone…
  27. Which of the following algorithms are meant for establishing the paths through the network?
  28. Which of the following is the IEEE specification for wireless networks?
  29. A time exceeded message is generated if .
  30. --------------- is/are used for error detection.