Home

ICMP messages require ………………. levels of encapsulation

A. One

B. Two

C. Three

D. Four

Related Questions

  1. Which of the following states suggests that the connection has been ended either at the request of the…
  2. What is the default subnet mask for a class B network?
  3. Videoconferencing is an example for…………………… communication
  4. The Hamming Distance for the codes generated using either even or odd parity will be------------------
  5. Internet e-mail system based on the ……………………………………………..
  6. If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization…
  7. You're configuring a dial-up connection to an ISP. Which of the following protocols is used?
  8. 80 is the well-known port number for the HTTP service.
  9. How many table entries are supported by global routing table in CIDR?
  10. Which of the following filed represents the sender of the message in an electronic mail?
  11. Which of the following provides a structure for conveying message through TCP/IP network to host?
  12. Which of the following algorithms are easy to implement and debug?
  13. T1 makes up 24 channels.
  14. What are the subnet mask in dotted decimal notation for /20 networks?
  15. In distance vector routing an active router sends out information ………………………….
  16. Which of the following is required to communicate between two computers?
  17. You have a network card with the connector in question 43, and it also has a 9 pin female connector.…
  18. Which of the following is the port used by SMTP?
  19. Where are routing tables placed?
  20. E-mail is an example of ………………………… mode…
  21. What is the default subnet mask for a class B network?
  22. In 1996, 36.44% of _________ addresses were brought in use.
  23. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  24. What is the distance limitation of Cat5 UTP?
  25. When collection of various computers seems a single coherent system to its client, then it is called…
  26. Which of the following is used for testing the data-link connection in a PPP network?
  27. Class C network address class supports 65,534 hosts.
  28. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  29. Which of the following is defined in RFC 4366?
  30. OSPF is based on …………………

Please do not use chat terms. Example: avoid using "grt" instead of "great".