Network Engineer Questions


Q:

What is NVT?

Answer

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

1 4127
Q:

What is Kerberos?

Answer

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

1 4126
Q:

The process of encoding refers to

A) getting information into memory. B) the recall of information previously learned.
C) a clear memory of an emotionally significant event. D) the persistence of learning over time.
 
Answer & Explanation Answer: A) getting information into memory.

Explanation:

Encoding refers to the getting information into memory.

Report Error

View Answer Report Error Discuss

6 4125
Q:

How are ip addresses available to the internet classified?

A) Static B) Public
C) Private D) None of the above
 
Answer & Explanation Answer: B) Public

Explanation:

An IP address (internet protocol address) is a numerical representation that uniquely identifies a specific interface on the network. Addresses in IPv4 are 32-bits long. This allows for a maximum of 4,294,967,296 (2^32) unique addresses. Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2^128) unique addresses.

 

IP addresses available to the internet are classified as Public.

Report Error

View Answer Report Error Discuss

2 4112
Q:

Alone I am 24th, with a friend I am 20. Another friend and I am unclean. What am I?

Answer

The answer is 'X'.


1. It is the 24th letter in the alphabetical order.


2. XX (20 in Roman)


3. XXX is used to refer dirty.

Report Error

View answer Workspace Report Error Discuss

7 4105
Q:

When a computer prints a report this output is called

A) Soft copy B) Hard copy
C) Printing D) Program
 
Answer & Explanation Answer: B) Hard copy

Explanation:

Hard copy is the output which is printed by the computer.

Report Error

View Answer Report Error Discuss

3 4078
Q:

Application layer protocol defines

A) message format, syntax and semantics B) rules for when and how processes send and respond to messages
C) types of messages exchanged D) All of the above
 
Answer & Explanation Answer: D) All of the above

Explanation:

Application layer protocol defines types of messages exchanged, message format, syntax and semantics and rules for when and how processes send and respond to messages.

Report Error

View Answer Report Error Discuss

Filed Under: Networking
Exam Prep: AIEEE
Job Role: Network Engineer

8 4066
Q:

RADAR is used for

A) detecting and locating the position of objects such as Aeroplanes B) locating submerged submarines
C) locating geostationary satellites D) receiving a signals in a radio receiver
 
Answer & Explanation Answer: A) detecting and locating the position of objects such as Aeroplanes

Explanation:

RADAR - RAdio Detection And Ranging.

A radar system consists of a transmitter producing electromagnetic waves in the radio or microwaves domain, a transmitting antenna, a receiving antenna (often the same antenna is used for transmitting and receiving) and a receiver and processor to determine properties of the objects. 

 

Radar is an object-detection system that uses radio waves to determine the range, angle, or velocity of objects. It can be used to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, weather formations, and terrain.

 

Radio waves from the transmitter reflect off the object and return to the receiver, giving information about the object's location and speed.

Report Error

View Answer Report Error Discuss

Filed Under: Physics
Exam Prep: GATE , CAT , Bank Exams , AIEEE
Job Role: Network Engineer , IT Trainer , Bank PO , Bank Clerk , Analyst

5 4019