Related Questions
What is the correct answer?
4
In Integrated services model, ________ corresponds to token bucket filter.
What is the correct answer?
4
How many number of host/machine can be attached to a network using a class B address?
What is the correct answer?
4
Which of the following versions will replace IPv4 Internet layer?
What is the correct answer?
4
What is the IEEE specification for Ethernet?
What is the correct answer?
4
Which of the following is required to communicate between two computers?
A. Communications software
C. Communication hardware
D. All of the above including access to transmission medium
What is the correct answer?
4
Which piece of equipment operates at both the data-link and network layers?
What is the correct answer?
4
AppleTalk protocol configures hosts in zones on the network.
What is the correct answer?
4
Thick Ethernet cable uses what type of connector? Select all that apply.
What is the correct answer?
4
UDP datagram has a header, which is of ________.
What is the correct answer?
4
In FTP, to execute a file transfer, the user begins by _________.
A. Navigating the directory structure
B. Connecting to a remote host
C. Listing files available for transfer.
D. Defining the transfer mode
What is the correct answer?
4
The key concern in the design of transmission system is -------------- and ---------------
What is the correct answer?
4
Class C network address class supports 65,534 hosts.
What is the correct answer?
4
Which of the following defines a family of standards for 100 Mbps fiber optic LANs that
provides the physical layer and media access control sub-layer of the data link layer, as
defined by the ISO/OSI Model?
C. Fiber Distributed Data Interface (FDDI)
D. Point-to-Point Protocol (PPP)
What is the correct answer?
4
Which of the following can provide a backbone network of 600 meters in length without using repeaters?
What is the correct answer?
4
What are the subnet mask in dotted decimal notation for /20 networks?
What is the correct answer?
4
Which is the port used by HTTPS?
What is the correct answer?
4
FDDI operates on 100 Mbps.
What is the correct answer?
4
A time exceeded message is generated if ………………………………………………….
A. The round trip time between hosts is close to zero.
B. The Time-to Live field has a zero value.
C. Fragments of a message do not arrive within a set time
What is the correct answer?
4
At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
What is the correct answer?
4
Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?
What is the correct answer?
4
_____________________ are set up to fulfill service ordering, service assurance, and
billing functions.
D. Complex Operation Support Systems (OSS)
What is the correct answer?
4
The special address 'THIS HOST' is referred to as
What is the correct answer?
4
Which of the following protocols use a topology table to install routes into the IP routing
table?
A. Open Shortest Path First (OSPF)
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Exterior Gateway Protocol (EGP)
D. Static routing protocols
What is the correct answer?
4
The packet transmit using standard Internet Protocol(IP) throughout the Internet by
What is the correct answer?
4
What is the address identified when socket is available at each end of TCP?
A. "<TCP, IP address, socket number>."
B. "<TCP, Host address, port address>."
C. "<TCP, IP address, port number>."
D. "<TCP, Network address, socket address>."
What is the correct answer?
4
What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.
What is the correct answer?
4
Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
D. Control Message Protocol
What is the correct answer?
4
Which directory service is used in Windows 2000 Server?
What is the correct answer?
4
What is the default port for Telnet?
What is the correct answer?
4
_____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol