Addition of broadcast domains
Addition of bandwidth for users
Addition of broadcast users
None of the above
B. Addition of bandwidth for users
1991
1994
1997
1999
A and B
A and C
A, B, and C
D
Certificate Authorities authenticate the identity of computers.
Certificate Authorities authenticate the identity of Individuals.
Both
None
Only A
A, B, and C
B and D
Only B
8080
8005
9082
None of the above
Message Type Protocol
Message Transfer Protocol
Media Transfer Protocol
Media Transmission Protocol
Session Layer
Network Layer
Presentation Layer
Data Link Layer
User specified Dialog Protocol
User Datagram Protocol
User Dialog Protocol
Unsent Data Protocol
KGD
USER
RETR
RMD
Internet Protocol Configuration
International Protocol Configuration
Internet Packet Configuration
Internet Process Configuration
VLAN is a virtual LAN, it is used to share only files within created LAN
VLAN is a virtual LAN which is used to divide a single broadcast domain into multiple broadcast domains
VLAN is a virtual LAN, it is used to share only hardware resources within created LAN
None of the above
A and B
A and C
B and C
D
A and B
A, B, and D
A and D
A, B, C, and D
%24
%25
%26
%27
8080
8090
9082
None of the above
L2TP
IKEv2
PPTP
None of the above
Open System International
Open System Interconnection
Open Server Interconnection
Open Server International
Next Physical Laboratory
National Physical Laboratory
Nexon Physical Laboratory
Nexon Physical Library
Unidirectional Ring topology
Bidirectional Ring topology
Collapsed Ring topology
All the above
Most Accessible Controller
Mobile Access Control
Mobile Access Communication
Media Access Control
1024
32767
65535
65536
Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.
WiFi cards are used to read the WiFi signal and create connectivity between user and network.
Both of the above
None of the above
Simple File Transfer Protocol
Safe File Transfer Protocol
Safety File Transfer Protocol
Secure File Transfer Protocol
80
443
15001
None of the above
Symmetric cryptography
Asymmetric cryptography
Both
None
Network layer
Transport layer
Presentation layer
Application layer
A and B
A , C, and D
A, B, and D
A, B, C, and D
Hyper Text Transfer Protocol Secure
Hyper Text Transfer Protocol Saturn
Hyper Time Transfer Protocol Saturn
Hyper Time Transfer Protocol Secure
International Server Provider
International Service Provider
Internet Service Provider
Intranet Service Provider
A and B
A and C
B, C, and D
A, B, C, and D