________allows receiver to inform sender about the successful receiving of all the

A. SACK-permitted Option

B. Window scale option

C. Selective Acknowledgment (SACK)

D. Maximum segment size option

You can do it
  1. A node, which is more powerful, and can handle local information processing or graphics processing is…
  2. Which of the following delivery methods works with only one source and one destination? Multicast
  3. Which of the following is required to communicate between two computers?
  4. E-mail is an example of ………………………… mode…
  5. Data Transmission is not a layer in the OSI model
  6. Which of the following provides the service for any casting?
  7. What is the maximum size of IP header in the UDP Datagram format?
  8. Which of the following provides control over multimedia sessions?
  9. To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.
  10. You wish to install a 100BaseT network. What type of cabling will you use?
  11. In Integrated services model, ________ corresponds to token bucket filter.
  12. T1 makes up 24 channels.
  13. Which of the following provides a structure for conveying message through TCP/IP network to host?
  14. Which of the following protocols are considered unreliable or connectionless?
  15. If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization…
  16. ________acts as source and destination for IP traffic.
  17. preamble field of 802.3 frames is encoded using ------------------- encoding
  18. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection…
  19. Which directory service is used in Windows 2000 Server?
  20. OSPF is based on …………………
  21. What are the subnet mask in dotted decimal notation for /20 networks?
  22. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key…
  23. Which of the following was initially designed as a video and audio compression standard?
  24. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  25. Transmission medias are classified into two main categories, which are -------------- and --------------------.
  26. AppleTalk protocol configures hosts in zones on the network.
  27. A financial institution that issues the card to the purchaser is ________.
  28. Which Layer is Responsible for Congestion Control?
  29. Which OSI model layer provides for encryption and decryption of data?
  30. Which of these is an example for unguided transmission?