Home

In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?

A. Non-authenticated state

B. Authenticated state

C. Selected state

D. Logout state

You can do it
  1. What can be used in the place of DNS to resolve host names to IP addresses?
  2. This mapping of name to IP address is done by …………………………….
  3. What is 10baseT?
  4. Which of the following is the IEEE specification for wireless networks?
  5. Which of the following states suggests that the connection has been ended either at the request of the…
  6. Which of the following is a simplex protocol?
  7. What is the maximum distance of single-mode fiber (SMF)?
  8. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  9. Which cable type is immune to outside interference and crosstalk?
  10. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line…
  11. Data Transmission is not a layer in the OSI model
  12. What is the maximum length of thinnet cable before a signal booster is needed?
  13. TCP protocol is responsible for connection-oriented communication
  14. Thinnet coaxial cable uses what type of connector?
  15. Which of the following protocols use a topology table to install routes into the IP routing table?
  16. You're configuring a dial-up connection to an ISP. Which of the following protocols is used?
  17. Which of the following protocols is described in RFC 793?
  18. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection…
  19. Destination physical address in ARP request is a ………………………….address.
  20. Twisted-pair cable uses what type of connector?
  21. Which of the following provides control over multimedia sessions?
  22. How many table entries are supported by global routing table in CIDR?
  23. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  24. Which of the following algorithms are easy to implement and debug?
  25. SMTP protocol is responsible for sending email across the Internet
  26. Videoconferencing is an example for…………………… communication
  27. Which of the following is used for testing the data-link connection in a PPP network?
  28. Which is the port used by POP3?
  29. In flags message attribute, which of the following flag indicates that message has been completed?
  30. OSPF is based on …………………