Home

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

You can do it
  1. What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that…
  2. The network interface layer specifies how to organize data into………………………..and…
  3. Which of the following delivery methods works with only one source and one destination? Multicast
  4. A modem is a card within a PC that converts the …………... the computer produces…
  5. You wish to install a 100BaseT network. What type of cabling will you use?
  6. Which of the following provides the service for any casting?
  7. What is the default port for Telnet?
  8. Which of the following protocol is used by Integrated Services for signaling of the reservation messages?
  9. At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
  10. Which of the following is the port used by SMTP?
  11. Which of the following fields holds the packets of several protocols?
  12. Select the class C IP address from the following:
  13. Which of the following is the IEEE specification for wireless networks?
  14. What is the length of MARKER field in BGP message header?
  15. FDDI operates on 100 Mbps.
  16. Which of the following is a media type that is most susceptible to interference?
  17. What is the default subnet mask for a class B network?
  18. DSL stands for ------------------------
  19. _______ Domain name corresponds to US military.
  20. Which class does the IP address 202.119.22.31 belong to?
  21. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  22. AppleTalk protocol configures hosts in zones on the network.
  23. Select the standard for token ring using token-passing media access.
  24. Which of the following provides control over multimedia sessions?
  25. Pure ALOHA has a maximum throughput of -----------
  26. ADSL uses high-speed Internet service phone lines
  27. Which of the following versions will replace IPv4 Internet layer?
  28. When collection of various computers seems a single coherent system to its client, then it is called…
  29. A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16.…
  30. Which is the port used by POP3?