Logo

Networking Questions Set 74:

Quiz Mode

WPA2 is used for security in _____

1
2
3
4

Solution:

The HTTP response message leaves out the requested object when the ____________ method is used.

1
2
3
4

Solution:

The main functionalities of the presentation layer include:

1
2
3
4

Solution:

The primary network layer protocol for the internet is

1
2
3
4

Solution:

The application layer offers _______ service.

1
2
3
4

Solution:

Unauthorized access of information from a wireless device through a Bluetooth connection is called

1
2
3
4

Solution:

The physical layer translates logical communication requests from the data link layer into hardware-specific operations.

1
2
3
4

Solution:

What is the purpose of the conditional GET mechanism in HTTP?

1
2
3
4

Solution:

The mechanism or technology used in Ethernet by which two connected devices choose common transmission parameters such as speed, duplex mode, and flow control is called

1
2
3
4

Solution:

Which sublayer of the data link layer performs data link functions that depend upon the type of medium?

1
2
3
4

Solution: