Home

In 1996, 36.44% of _________ addresses were brought in use.

A. Class A

B. Class D

C. Class B

D. Class C

You can do it
  1. How many table entries are supported by global routing table in CIDR?
  2. AppleTalk protocol configures hosts in zones on the network.
  3. Router B receives an update from router A that indicates Net1 is two hops away. The next update from…
  4. Which of the following is a media type that is most susceptible to interference?
  5. Which is the port used by HTTPS?
  6. Which of the following is required to communicate between two computers?
  7. The special address 'THIS HOST' is referred to as
  8. FDDI operates on 100 Mbps.
  9. Internet Research Task Force (IRTF) body looks after ________.
  10. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  11. UDP datagram has a header, which is of ________.
  12. The key concern in the design of transmission system is -------------- and ---------------
  13. Which of the following protocol resolves a host's hardware address for a known IP address?
  14. Which of the following algorithms are meant for establishing the paths through the network?
  15. T1 makes up 24 channels.
  16. Select the standard for token ring using token-passing media access.
  17. In ----------------------- configuration, the switch begins to forward the packet as soon as it is received.…
  18. You're configuring a dial-up connection to an ISP. Which of the following protocols is used?
  19. What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that…
  20. 80 is the well-known port number for the HTTP service.
  21. Which of the following delivery methods works with only one source and one destination? Multicast
  22. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  23. How many 64-Kbps channels are used on an ISDN BRI?
  24. Which of these cable is/are used to connect devices to hubs and switches.
  25. Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of servers?
  26. 802.5 project standard defines Token Ring.
  27. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…
  28. In distance vector routing an active router sends out information ………………………….
  29. AppleTalk protocol configures hosts in zones on the network.
  30. A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16.…