Home

How many table entries are supported by global routing table in CIDR?

A. 90,000

B. 80,000

C. 70,000

D. 60,000

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The packet transmit using standard Internet Protocol(IP) throughout the Internet by
  2. 802.5 project standard defines Token Ring.
  3. Which of the following is a simplex protocol?
  4. If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization…
  5. Which function is not supported by E-mail?
  6. What is the address identified when socket is available at each end of TCP?
  7. TCP protocol is responsible for logical addressing and delivery of packets.
  8. E-mail is an example of ………………………… mode…
  9. Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of servers?
  10. Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
  11. In which of the following states after selecting a mailbox, actions can be taken against the mail within…
  12. Which directory service is used in Windows 2000 Server?
  13. ________allows receiver to inform sender about the successful receiving of all the segments.
  14. Which type of BGP message is sent by a system to notify another router of the senders existence?
  15. Which of the following is used for establishing, configuring, and testing the data-link Link Control…
  16. Telnet protocol uses ___________ representation for the function Synchronize.
  17. Which of the following protocol resolves a host's hardware address for a known IP address?
  18. Strings enclosed in _______ quotation marks indicate single tokens.
  19. Data Transmission is not a layer in the OSI model
  20. Select the class C IP address from the following:
  21. UDP datagram has a header, which is of ________.
  22. Which cable type is immune to outside interference and crosstalk?
  23. How many 64-Kbps channels are used on an ISDN BRI?
  24. In Integrated services model, ________ corresponds to token bucket filter.
  25. 25 is used by SMTP
  26. Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?
  27. Which of the following algorithms are meant for establishing the paths through the network?
  28. To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.
  29. In the symmetric-key method of cryptography, which key is publicly known?
  30. ………………….is a technique of conversion between the representation…