Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Transmission Control Protocol Telnet protocol Internet Protocol Network Control Protocol
2. _______ body looks after the protocol identifiers used over Internet.
Internet Assigned Number Authority Internet Research Task Force Internet Engineering Task Force Internet Architecture Board
3. Which protocol at the application layer, transfers files that form pages on World Wide Web?
File Trans er Protocol !yperte"t Trans er Protocol Address Resolution Protocol #ser $atagram Protocol
Node
6. Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
$omain Name ,ystem FTP Telnet Control -essage Protocol
2. _________ is an encapsulation unit used at Inernet layer of the TCP/IP model and it has ________.
Frame. code ,egment. payload Packet. header and payload Bits. control bits
3. In ________ year, Internet Service Providers began to offer Internet access to __________.
(012. Research Institutions (010. Businesses (003. 4nly Indi%iduals (00). Businesses and indi%iduals'
4. TCP/IP protocol can be mapped to _________ layer conceptual model known as _________ model.
Three. 4,I
1.
1. TCP/IP is dependent on factors like network access method, frame format, and medium. 2. TCP/IP is used for communication over only similar network types and which make use of LAN technologies. 3. The layer called Network Interface layer sends TCP/IP packets through the network medium. 4. TCP/IP can easily adapt latest technologies. State true or false.
4nly statement ( is true ,tatements ( and + are alse ,tatements + and 5 are true 4nly statements & is alse
,tatement ( is alse ,tatements + and 5 are alse ,tatements 5 and & are true
3. 1. User Datagram Protocol is used when upper-layer protocols give reliable delivery
2. User Datagram Protocol is used when there is less data to be transferred. 3. Transmission Control Protocol does the functions like:Connection establishment and Recovering of packets. 4. TCP and UDP operate over Internet layers: IPv4 and IPv6. State true or false.
,tatements ( and + are true ,tatements ( and 5 are alse 4nly statement 5 is true 4nly statements & is alse'
4. In a X.25 protocol, the ________________ are sent as X.25 complete packet sequences.
Call #ser $ata 7C#$8 Network:6ayer Protocol Identi ier 7N6PI$8 $ata 6ink Connection Identi ier 7$6CI8 rotocol $ata #nits 7P$#s8
5. Which of the following is used for testing the data-link connection in a PPP network?
6ink Control Protocol 76CP8 -ethod Network Control Protocols 7NCPs8 Basic Rate Inter ace 7BRI8
2. All of the following are the features of the ISDN D-channel, except:
It is a (* kbps $:channel or control in ormation'
It is also used or sending PPP packets when suitably ramed' t is used or %oice or data or ;ust or data in a combined way' The $:channel inter ace re/uires NR< encoding'
4. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections running TCP/IP?
Fiber $istributed $ata Inter ace 7F$$I8 ,erial 6ine IP 7,6IP8 Point:to:Point Protocol 7PPP8 otocol 7PPP8 IEEE 23+'5
1. Which of the following statements regarding the Frame formats for Ethernet is true?
1. The type field in Ethernet is used to distinguish between different protocols running on the coaxial cable. 2. The maximum length of an Ethernet frame is 1526 bytes. 3. The Ethernet physical layer and the IEEE 802.3/802.2 physical layers are incompatible. 4. The header field of the Ethernet Frame format contains protocol-type number.
4nly statements ( and + are true 4nly statement 5 is true ,tatements (. + and & are true 4nly statements ( and 5 are true
2. Given below are some statements related to IEEE 802.2 and IEEE 802.3. Identify which two statements are true.
1. 802.2 LLC layer follows the concept called Link Service Access Point (LSAP). 2. The extended form of IEEE 802.2 protocol LLC layer follows the concept called Sub network Access Protocol (SNAP). 3. 802.2 LLC layer follows the concept called Link Control Protocol (LCP). 4. 802.3 LLC layer follows the concept called Network Control Protocols (NCPs).
,tatements ( and + are true ,tatements + and 5 are true ,tatements ( and 5 are true ,tatements + and & are true
1. Which of the following methods allows host (sender) to provide explicit routing information?
,trict source routing Internet time stamp Record Route 6oose source routing
6. Which of the following mechanism in DHCP assigns a permanent IP address to the host?
-anual Allocation $ynamic Allocation Automatic Allocation #nusual Allocation
1. Which of the following type of protocol was designed to be employed for hardware broadcast networks?
$ynamic !ost Con iguration Protocol 7$!CP8 Address Resolution protocol 7ARP8 Internet Control -essage Protocol 7IC-P8 Re%erse Address Resolution Protocol 7RARP8
2. Which of the following address supports 254 hosts on each of 2 million networks?
4. Which of the following help the client workstation to initialize with minimal IP stack?
$ynamic !ost Con iguration Protocol 7$!CP8 Bootstrap protocol Internet Control -essage Protocol 7IC-P8 Re%erse Address Resolution Protocol 7RARP8
1. Class A addressing ranges from 0.0.0.0 to 127.255.255.255. 2. Class B addressing ranges from 192.0.0.0 to 191.255.255.254. 3. Class E addressing ranges from 240.0.0.0 to 255.255.255.255 4. Class C addressing ranges from 224.0.0.0 to 223.255.254.254. State true or false.
,tatement ( = & are true ,tatement ( = 5 are true ,tatements + = 5 are true
,tatements ( and + are alse ,tatements + and 5 are alse 4nly ,tatement 5 is true ,tatements & and ( are true
3. Which of the following statements are true with regard to protocol address?
1. Protocol address length specifies the length of the protocol addresses in this packet. 2. Protocol address length specifies the length of the acknowlegement packet. 3. The source/target protocol contains the physical network hardware addresses. 4. The source/target protocol address contains the protocol addresses. State true or false.
,tatements ( and + are alse ,tatements + and 5 are alse 4nly ,tatement 5 is true ,tatements & and ( are true
1. How many table entries are supported by global routing table in CIDR?
03.333
3. What is the maximum number of hosts that can be allocated in Class B network?
*).333 *).55& *).5)3 *).+53
6. Which of the following network providers cannot employ any default inter domain routing?
Type + Type & Type ( Type 5
1. Which of the following addresses has one-to-one relation between source and destination?
-ulticast #nicast Broadcast Any cast
1. CIDR is:
1. Not designed to assign more IP addresses. 2. Based only on the higher order bits, called IP prefix. 3. Designed to assign more IP addresses in a significant manner. 4. Based mainly on the higher order bits called IP suffix. State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements & and ( are true
2. Identify the true statements from the following concepts of direct and indirect routes.
1. Direct routes describes the locally attached networks. 2. Direct route contains route, which is used when destination IP network is not found in the mappings of the previous types of type 1 and 2. 3. Default routes describes networks reachable through one or more gateways. 4. Indirect routes describes networks reachable through one or more gateways. State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements & and ( are true
2. Limited Broadcast Address is used in ARP requests on un-subnetted networks. 3. Network-Directed Broadcast Address is used in ARP requests on un-subnetted networks. 4. Proxy-ARP is used when atleast one host support supernetting. State true or false.
,tatements ( and 5 are true' ,tatements 5 and & are alse' 4nly ,tatement & is true ,tatements & and + are true
1.
Which of the following synchronizes the sequence numbers in TCP segment format?
3.
What is the format for association used in sockets ?
? local:address. local:port. oreign:address. oreign:port@ ?protocol. local:address. local:port. oreign:address@ ?protocol. local:address. oreign:address. oreign:port@
5. What is the address identified when socket is available at each end of TCP?
?TCP. IP address. socket number@' ?TCP. !ost address. port address@' ?TCP. IP address. port number@' ?TCP. Network address. socket address@'
6.
In TCP segment format _______indicates start of data.
1. _________ is used for transferring smaller data units by every TCP/IP implementation.
Address Resolution Protocol 7ARP8 Internet Control -essage Protocol 7IC-P8 #ser $atagram Protocol 7#$P8 Bootstrap Protocol 7B44TP8
3. _________ is used for transferring smaller data units by every TCP/IP implementation.
Address Resolution Protocol 7ARP8 Internet Control -essage Protocol 7IC-P8 #ser $atagram Protocol 7#$P8 Bootstrap Protocol 7B44TP8
,tatements ( and + are alse ,tatements + and ( are true 4nly ,tatement & is alse ,tatements 5 and ( are true
1. The half-association is also called a socket or a transport address. 2. Socket does not provides a communication path to the port. 3. The half-association is also called a port. 4. Socket provides a communication path to the port. State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements & and ( are true
,tatements ( and 5 are true ,tatements ( and & are true 4nly ,tatement ( is alse ,tatements + and ( are alse
1. Which of the following in Open Shortest Path First (OSPF) protocol uses multiple paths and makes effective use of network resources?
Faster con%ergence time ,upport or authentication 6ogical partitioning o the network E/ual cost load balancing
2. Which of the following provides metrics for locating the network paths?
Enhanced Interior Bateway Routing Protocol 7EIBRP8 E"terior Bateway Protocol 7EBP8 Border Bateway Protocol 7BBP8 ,tatic Routing protocol
3. ____________ supports supernetting (CIDR) and variable length subnet masks (VLSM).
E"terior Bateway Protocol 7EBP8 Enhanced Interior Bateway Routing Protocol 7EIBRP8 Border Bateway Protocol 7BBP8 ,tatic Routing protocol
4. ____________ are used to monitor neighbor reachability and solicit update responses.
,tatic Routing protocol Enhanced Interior Bateway Routing Protocol 7EIBRP8 Border Bateway Protocol 7BBP8 E"terior Bateway Protocol 7EBP8
Path Cector
1. Which of the following protocol decreases the costs of link state updates and distance vector advertisements?
6ink ,tate routing !ybrid routing $istance Cector routing Path Cector routing
2. Which feature in RIP does not allow the routing table to get corrupted?
RIP:( CI$R and C6,Authentication -ulticasting
4. __________ maintains a table called neighbor table, which helps in keeping a track of each adjacent neighbor.
,tatic Routing protocol
Enhanced Interior Bateway Routing Protocol 7EIBRP8 E"terior Bateway Protocol 7EBP8 Border Bateway Protocol 7BBP8
1. Given below are the statements related to IP router and routing protocols:
1. The ability to form connections between different physical networks is called an IP router. 2. A robust routing protocol does not provides the ability to dynamically build and manage the information. 3. The ability to form connections between different artificial networks is called an IP router. 4. A robust routing protocol provides the ability to dynamically build and manage the information . State true or false.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
2. Following are the statements based on Routing Information Protocol and its versions. Identify which of them are true.
1.RIPng uses the same algorithms, timers, and logic used in RIP-6. 2.RIP-1 was designed to be used by routers within an IPv6-based network. 3. RIPng uses the different algorithms, timers, and logic used in RIP-2. 4. RIPng was designed to be used by routers within an IPv6-based network. State true or false.
1. Autonomous System (AS) is integral to understanding the function and scope of a routing protocol. 2.Interior Gateway Protocols allow the exchange of summary information between autonomous systems. 3.Autonomous System (AS) is integral to understanding only scope of a routing protocol. 4. Exterior Gateway Protocols allow the exchange of summary information between autonomous systems. State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements & and ( are true
1. In IGMP message format, which of the following specify an IGMPv2 membership report packet?
3"D(+D 3"D(1D 3"D((D 3"D(*D
5. Which of the following addresss is reserved for all IGMPv3-capable multicast routers?
++&'3'3'3 ++&'3'3'++ ++&'3'3'( ++&'3'3'+
1. __________ protocol is used when multicast data has to be sent to majority of host over the network.
PI-:,- protocol PI-:$- protocol
2. Which of the following application of multicast, provides audio/audio-video communication facility to many-to-many connection?
$ata distribution Baming and simulation -ultimedia con erencing Real:time data multicast
3. The count of source addresses contained in an IGMPv3 message is indicated by _______ field.
Number o ,ources 7N8 , Flag uerierDs 9uery Inter%al Code uerierDs Robustness Cariable
4. Which of the following protocols has the capability to significantly reduce the congestion over the network?
PI-:,- protocol PI-:$- protocol -ulticast ,ource $isco%ery Protocol 7-,$P8 E"terior Bateway Protocol 7EBP8
1. Given below are the statements related to transient and permanent groups?
1. In Transient group, host can leave or join this group as when needed. 2. Permanent group follows a dynamic way of addressing and is not permanent. 3. Permanent group exists even with zero members. 4. Transient group does not exist, if the members in the group are zero.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is alse ,tatements + and 5 are alse
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true
3. Identify which of the given statements are true with regard to unicast and mulitcast algorithms.
1. Unicast algorithms must maintain loop-free routes. 2. Multicast algorithms must optimize the path from source to destinations. 3. Multicast algorithms must route data only to group members. 4. Unicast algorithms must optimize the path from source to destinations. State true or false.
,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true
2. ___________ defines traffic and QoS characteristics for a particular flow of data packets.
Flow descriptor Flow control Tra ic control Policy control
4. Which parameter specifies maximum packet size in bytes that conforms to the Tspec?
Parameter r Parameter b Parameter m Parameter -
5. When traffic is passed through token bucket filter, the overall time period, T should not exceed ________.
rT:b +rTE)b rTEb rT:+b
1. _________ recommends that an RSVP implementation should use the object order defined in RFC.
RFC ++33 RFC ++3) RFC ++3& RFC ++35
2. Which of the following field contains IP address of the node in RSVP object header?
,tyle N#66 R,CPF!4P ,ession
3. Which of the following has maximum length of 65528 bytes in Resource Reservation Protocol (RSVP)?
4b;ect contents C:Type
Class:Number Integrity
1. Which of the following statements based on Differentiated Service field are true?
1. The DS field uses the space of the former TOS octet in the IPv4 IP header. 2. DS field is not used to mark the packets that receive a particular forwarding treatment at each network node. 3. The DS field uses the space of the former TOS octet in the IPv5 IP header. 4. DS field is used to mark the packets that receive a particular forwarding treatment at each network node. State true or false.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true
3. Given below are a few services. Identify which statements are true.
1. Integrated Service offers predictable performance for a given load at a given time. 2. Controlled Load Service is intended to support the class of applications that are highly sensitive to overloaded conditions in the Internet. 3. The Guaranteed Service model provides functions that assure that datagram will arrive within a guaranteed delivery time. 4. Guaranteed Service is intended to support the class of applications that are highly sensitive to overloaded conditions in the Internet. State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true
2. Which of the following firewall consists of a packet-filtering router and an application-level gateway?
,creened host irewall $ual:homed gateway irewall
3. Currently security association management mechanisms are defined only for ________ addresses.
Any cast Broadcast -ulticast #nicast
2. In case of Secure Electronic Transaction, ______request from merchant asks acquirer to transfer previously authorized amount into its account.
Purchase order AuthoriGation Capture In/uiry
1. The Security Policy Database specifies what security services are to be offered to the IP traffic. 2. The Security Policy Database contains parameter information. 3. The Security Association Database specifies what security services are to be offered to the IP traffic.
4. The Security Association Database contains parameter information. State true or false.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
1. Tunneling or encapsulation is a common technique in packet-switched networks. 2. Tunneling is used to carry traffic of one protocol over a network that supports that protocol directly. 3. Tunneling or encapsulation is a rare technique used in packet-switched networks. 4. Tunneling is used to carry traffic of one protocol over a network that does not support that protocol directly. State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true
,tatements + and 5 are true 4nly ,tatement & is true ,tatements & and 5 are alse
2. Which of the following center maintained the host names to address mappings?
Network In ormation Center 7NIC8 Network center IP address center !ost in ormation center
6. Which among the following domains are maintained by Internet Corporation for Assigned Names and Numbers (ICANN)?
,peci ic domains ,tate domains Beneric domains Country domains
1. Which of the following server, loads zone's information from disk and has authority over the zone?
,econdary Primary Caching:4nly Caching
2. _________ field in the DNS General Resource Record identifies the protocol family.
Name Type Class TT6
,er%er name
4. Which response is displayed when message is not processed because of the server?
Name error er%er ailure Not implemented Format error
1. Which of the following statements based on Domain Name System are true?
1. The Domain Name System distributed database is composed of Resource Records (RRs). 2. All messages in the Domain Name System protocol use a different format. 3. The Domain Name System distributed database is composed of Start of Authority (SOA) records. 4. All messages in the Domain Name System protocol use a single format. State true or false.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
4. Maintaining one central list of the name to- IP-address relationships across the Internet is realistic. State true or false.
,tatements ( and + are true ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true
3. Identify the true statement with regard to domain name. 1. A domain name that ends with a comma is called a fully qualified domain name.
2. If a domain name ends with a dot, it is said to be complete. 3. A domain name that ends with a dot is called a semi- qualified domain name. 4. If a domain name ends with a comma it is said to be complete. State true or false.
4nly statement ( is true 4nly statement + is true ,tatements + and 5 are true ,tatements ( and & are true
Cirtual Terminal
3. Both the host and client can propose additional options, as Telnet uses the________ model.
Asymmetric ,ymmetric ,tatic Iater all
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
2. "1. Remote Execution Command Protocol (REXEC) performs automatic login and user authentication when a user ID and password are entered.
2. Remote Shell Protocol (RSH) command is used to define the user ID, password, host address and the process to be started on the remote host. 3. Remote Shell Protocol (RSH) performs automatic login and user authentication when a user ID and password are entered. 4. Remote Execution Command Protocol(REXEC) command is used to define the user ID, password, host address, and the process to be started on the remote host." State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true
3. "1.Remote Shell Protocol (RSH) is a server that allows the execution of jobs submitted from a remote host over the TCP/IP network.
2. The primary goal of the Telnet protocol is the provision of a standard interface for hosts over a network. 3. Remote Execution Command Daemon (REXECD) is a server that allows the execution of jobs submitted from a remote host over the TCP/IP network. 4. The primary goal of the File transfer protocol(FTP) is the provision of a standard interface for hosts over a network." State true or false.
4. Which of the following command of Trivial File Transfer Protocol specifies destination host ID?
Put ?remote ilename@ J?local ilename@K Bet ?remote ilename@ J?local ilename@K -ode ?asciiLbinary@ Connect ?host@
6. TFTP servers do not allow, which of the following access to public directories?
Read Access Tras er Access Irite Access Control Access
1. While navigating the directory structure, the subcommand that changes the directory on remote host is ___________.
6cd cd 6s $ir
3. Which command copies a file from the remote host to the local host?
Bet -get Put -Put
4. Which of the following Transport Layer Security (TLS) command specifies the data channel protection level?
A$AT PR4T PB,< A#T!
1. "Which of the following statements based on Trivial File Transfer Protocol (TFTP) and File Transfer Protocol (FTP) are true.
1. TFTP use diskless devices to download firmware at boot time. 2. FTP uses any automated process for which the assignment of a user ID or password is not feasible. 3. FTP use diskless devices to download firmware at boot time. 4. TFTP uses any automated process for which the assignment of a user ID or password is not feasible." State true or false.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
4. Trivial File Transfer Protocol (TFTP) is limited to only reading a file from a server or writing a file to a server." State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true
3. "Which of the following statements related to data transfer modes in TFTP are true?
1. The hexa mode, octet mode and NetASCII are the data trasfer modes in TFTP. 2. Octet mode is of 8-bit bytes and is also known as decimal. 3. NetASCII mode is a modified form of ASCII and is of 8-bits. 4. The use of octet mode is specified in the TFTP header for the Request for Read/Write packets." State true or false.
4nly statemtent ( is true ,tatements ( and + are true ,tatements 5 and & are true 4nly statement & is alse
4. "Which of the following statements related to data transfer modes in TFTP are true?
1. The hexa mode, octet mode and NetASCII are the data trasfer modes in TFTP. 2. Octet mode is of 8-bit bytes and is also known as decimal. 3. NetASCII mode is a modified form of ASCII and is of 8-bits. 4. The use of octet mode is specified in the TFTP header for the Request for Read/Write packets."
4nly statemtent ( is true ,tatements ( and + are true ,tatements 5 and & are true 4nly statement & is alse
1. Which of the following always keeps messages on the server and replicates copies to the clients?
Post 4 ice Protocol 7P4P8 ,imple -ail Trans er Protocol File Trans er Protocol 7FTP8 Internet -essage Access Protocol 7I-AP&8
2. While using which of these should a client be always connected to the server for the changes to be made?
Internet -essage Access Protocol 7I-AP&8 ,imple -ail Trans er Protocol 7,-TP8 File Trans er Protocol 7FTP8 Post 4 ice Protocol 7P4P8
4. Which of the following flags denotes that the message has been marked for special attention?
M$ra t MAnswered
M$eleted MFlagged
5. Which of the following desination address contains explicit routing information in SMTP Destination Address?
userNhost Nhost:a. host:bOuserNhost:c userP remote:hostNgateway:host user remote:hostNgateway:host
1. Which of the following command contains the reverse-path that can be used to report errors?
!E64 command -AI6 command RCPT command $ATA command
2. Which of the following states suggests that the connection has been ended either at the request of the client or for any other reason?
,elected state Authenticated state 6ogout state Non:authenticated state
Flags message attribute #ni/ue identi ier 7#I$8 message attribute -essage se/uence number message attribute ,e/uence number message attribute
4. Which of the following flags cannot be changed by the client in IMAP4 Messages?
M$ra t MRecent M$eleted MFlagged
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
3. The SMTP design is based on the model of communication. 4. The sender FTP will generate commands that are replied to by the receiver SMTP in mail exchange." State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement & is true ,tatements ( and 5 are true
3. "1. Simple Mail Transfer Protocol (SMTP) allows clients to make changes both when connected and when disconnected models.
2. IMAP4 model provides more functionality to users than the POP model. 3. IMAP4 allows clients to make changes both when connected and when disconnected models. 4. Simple Mail Transfer Protocol (SMTP) model provides more functionality to users than the POP model." State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true
1. Which of the following function in SIP technologies is used for feature negotiation?
,ession setup #ser location and name translation #ser a%ailability #sers capabilities
2. Which of the following network server provides application layer routing of SIP requests and responses?
Pro"y ser%er Registrar ser%er Application ser%er -edia ser%er
6. Which of the following was designed for bit rates up to 1.5 Mbps in Moving Pictures Expert Group (MPEG) standards?
-PEB:+ -PEB:5
-PEB:( -PEB:&
1. Which of the following source description provides the geographic location of the application user?
E-AI6 T446 64C N4TE
3. ________________ packet is used by an RTP sender to provide local capability information in control information.
,ource description ,ender report Recei%er report APP
4. ___________ is the primary profile for broadcast and disc storage applications.
E"tended Pro ile 7RP8 Intended !igh Pro ile 7!iP8 !igh (3 Pro ile 7!i(3P8 !igh &O+O+ Pro ile 7!i&++P8
1. "1. User availability determines whether the called party is willing to engage in communication.
2. Session management is used for establishing the communication session parameters at both ends. 3. Users capabilities determines whether the called party is willing to engage in communication. 4. Session setup is used for establishing the communication session parameters at both ends." State true or false.
,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true
2. "1. Analog Terminal Adapters (ATA) controls connections between the circuit and packet networks in segments.
2. Call Agent can use a TCP/IP link to manage multiple Media Gateways. 3. Coder-decoder (CODEC) can use a TCP/IP link to manage multiple Media Gateways. 4. Soft switch controls connections between the circuit and packet networks in segments." State true or false.
,tatements ( and + are alse ,tatements ( and 5 are true 4nly ,tatement 5 is true ,tatements + and & are true
3. "1. G.728 is a speech CODEC standard covering the transmission of voice at rates of 16, 24, 32, and 40 kbps.
2. G.711 (64 kbps) standard encodes non-compressed speech streams running at 64 Kbps. 3. G.726 is a speech CODEC standard covering the transmission of voice at rates of 16, 24, 32, and 40 kbps.
4. G.723.1, encodes non-compressed speech streams running at 64 Kbps." State true or false.
,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true