Related Questions
What is the correct answer?
4
_____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol
What is the correct answer?
4
What is the default subnet mask for a class A network?
What is the correct answer?
4
Which directory service is used in Windows 2000 Server?
What is the correct answer?
4
Internet e-mail system based on the ……………………………………………..
B. Simple Mail Transfer Protocol (SMTP)
What is the correct answer?
4
Which of the following is a media type that is most susceptible to interference?
A. Shielded twisted pair (STP)
C. Unshielded twisted pair (UTP)
What is the correct answer?
4
Which of the following versions will replace IPv4 Internet layer?
What is the correct answer?
4
Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.
What is the correct answer?
4
The network interface layer specifies how to organize data into………………………..and Internet layer specifies the format of …………………….. Sent across an Internet.
What is the correct answer?
4
802.5 project standard defines Token Ring.
What is the correct answer?
4
Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
D. Control Message Protocol
What is the correct answer?
4
_______ body looks after the protocol identifiers used over Internet.
A. Transmission Control Protocol
D. Network Control Protocol
What is the correct answer?
4
Which of the following pieces of equipment will receive a packet from one port and forward that packet out the one port to which the destination computer is connected?
What is the correct answer?
4
When collection of various computers seems a single coherent system to its client, then it is called
What is the correct answer?
4
Telnet protocol uses ___________ representation for the function Synchronize.
What is the correct answer?
4
How many table entries are supported by global routing table in CIDR?
What is the correct answer?
4
In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
What is the correct answer?
4
Network administrator checks whether all the devices connected to the end-to-end path
are _________-enabled.
What is the correct answer?
4
ICMP messages require ………………. levels of encapsulation
What is the correct answer?
4
What layer of the OSI protocol reference model does a bridge operate under?
What is the correct answer?
4
Which of the following protocols is not routable?
What is the correct answer?
4
________acts as source and destination for IP traffic.
What is the correct answer?
4
Which is the port used by HTTPS?
What is the correct answer?
4
Class C network address class supports 65,534 hosts.
What is the correct answer?
4
What is the pattern of a preamble?
What is the correct answer?
4
T1 makes up 24 channels.
What is the correct answer?
4
Which of the following network topologies has the highest level of redundancy?
What is the correct answer?
4
Which cable type is immune to outside interference and crosstalk?
What is the correct answer?
4
What is attenuation?
C. loss of signal strength
D. unwanted signals on the network
What is the correct answer?
4
TCP protocol is responsible for logical addressing and delivery of packets.
What is the correct answer?
4
80 is the well-known port number for the HTTP service.