Related Questions
What is the correct answer?
4
Which of the following protocol resolves a host's hardware address for a known IP
address?
What is the correct answer?
4
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….
What is the correct answer?
4
Which of the following filed represents the sender of the message in an electronic mail?
What is the correct answer?
4
Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?
What is the correct answer?
4
Which of the following fields holds the packets of several protocols?
What is the correct answer?
4
What is attenuation?
C. loss of signal strength
D. unwanted signals on the network
What is the correct answer?
4
What is the maximum length of thick Ethernet cable before a signal booster is needed?
What is the correct answer?
4
What can be used in the place of DNS to resolve host names to IP addresses?
What is the correct answer?
4
In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.
What is the correct answer?
4
25 is used by SMTP
What is the correct answer?
4
Which of the following are not the standard representations defined by Telnet protocol?
What is the correct answer?
4
Which piece of equipment operates at both the data-link and network layers?
What is the correct answer?
4
AppleTalk protocol configures hosts in zones on the network.
What is the correct answer?
4
What is the default subnet mask for a class A network?
What is the correct answer?
4
Which of the following was initially designed as a video and audio compression standard?
What is the correct answer?
4
Data Transmission is not a layer in the OSI model
What is the correct answer?
4
80 is the well-known port number for the HTTP service.
What is the correct answer?
4
Which of the following algorithms are meant for establishing the paths through the network?
What is the correct answer?
4
___________ is based on resources that are present within the Diffserv region.
What is the correct answer?
4
In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
What is the correct answer?
4
Select the class C IP address from the following:
What is the correct answer?
4
How many table entries are supported by global routing table in CIDR?
What is the correct answer?
4
What is the code used for Interpret As Command (IAC)?
What is the correct answer?
4
In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?
A. Non-authenticated state
What is the correct answer?
4
Which function is not supported by E-mail?
What is the correct answer?
4
________acts as source and destination for IP traffic.
What is the correct answer?
4
____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.
A. Enhanced Interior Gateway Routing Protocol (EIGRP)
B. User Datagram Protocol (UDP)
C. Border Gateway Protocol (BGP)
D. User Datagram Protocol (UDP)
What is the correct answer?
4
Which of the following is required to communicate between two computers?
A. Communications software
C. Communication hardware
D. All of the above including access to transmission medium
What is the correct answer?
4
Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?
What is the correct answer?
4
In FTP, to execute a file transfer, the user begins by _________.
A. Navigating the directory structure
B. Connecting to a remote host
C. Listing files available for transfer.
D. Defining the transfer mode