Home
You can do it
  1. A node, which is more powerful, and can handle local information processing or graphics processing is…
  2. Which of the following states suggests that the connection has been ended either at the request of the…
  3. How many layers are there in the OSI model?
  4. …………………………..combines characteristics of…
  5. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  6. What does a patch cable connect to within an Ethernet network?
  7. Which of the following delivery methods works with only one source and one destination? Multicast
  8. SMTP protocol is responsible for sending email across the Internet
  9. Data Transmission is not a layer in the OSI model
  10. What is the address identified when socket is available at each end of TCP?
  11. ………………….is a technique of conversion between the representation…
  12. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  13. Which of the following is the IEEE specification for wireless networks?
  14. Which of the following is a media type that is most susceptible to interference?
  15. FDDI operates on 100 Mbps.
  16. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  17. AppleTalk protocol configures hosts in zones on the network.
  18. A time exceeded message is generated if ………………………………………………….
  19. The generic domain name for air transport industry is ________.
  20. Which of the following connectors is used by UTP on a Fast Ethernet network?
  21. T1 makes up 24 channels.
  22. Videoconferencing is an example for…………………… communication
  23. What layer of the OSI protocol reference model does a bridge operate under?
  24. How many number of host/machine can be attached to a network using a class B address?
  25. Which of the following is used for testing the data-link connection in a PPP network?
  26. Internet Architecture Board (IAB) governs which of the following bodies?
  27. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key…
  28. What is the pattern of a preamble?
  29. To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.
  30. Which of the following protocols are considered unreliable or connectionless?