Home
You can do it
  1. In flags message attribute, which of the following flag indicates that message has been completed?
  2. 80 is the well-known port number for the HTTP service.
  3. Your Web server is also configured as an FTP server. What part of the data packet will tell the server…
  4. _____________________ are set up to fulfill service ordering, service assurance, and billing functions.
  5. What is the distance limitation of Cat5 UTP?
  6. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  7. …………………………..combines characteristics of…
  8. Which is the port used by POP3?
  9. What is the address identified when socket is available at each end of TCP?
  10. In Integrated services model, ________ corresponds to token bucket filter.
  11. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain…
  12. Which is the port used by HTTPS?
  13. You have a network card with the connector in question 43, and it also has a 9 pin female connector.…
  14. Which of these is an example for unguided transmission?
  15. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
  16. Which of the following network topologies has the highest level of redundancy?
  17. FDDI operates on 100 Mbps.
  18. Which cable type is immune to outside interference and crosstalk?
  19. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line…
  20. What are the subnet mask in dotted decimal notation for /20 networks?
  21. What is the maximum distance of single-mode fiber (SMF)?
  22. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
  23. Which of the following is also known as IP masquerading?
  24. What is the default subnet mask for a class B network?
  25. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  26. T1 makes up 24 channels.
  27. What is the distance limitation of Cat5 UTP?
  28. What is 10baseT?
  29. Which of the following algorithms are easy to implement and debug?
  30. 127.0.0.1 address is reserved for internal loopback functions.