Related Questions
What is the correct answer?
4
Pure ALOHA has a maximum throughput of -----------
What is the correct answer?
4
Which of the following network topologies has the highest level of redundancy?
What is the correct answer?
4
Which of these cable is/are used to connect devices to hubs and switches.
What is the correct answer?
4
Which of the following is also known as IP masquerading?
A. Fiber Distributed Data Interface (FDDI)
B. Network Address Translation (NAT)
C. Classless Inter-Domain Routing (CIDR)
What is the correct answer?
4
In FTP, to execute a file transfer, the user begins by _________.
A. Navigating the directory structure
B. Connecting to a remote host
C. Listing files available for transfer.
D. Defining the transfer mode
What is the correct answer?
4
Which of the following IEEE specifications uses CSMA/CD?
What is the correct answer?
4
Which of the following address supports 254 hosts on each of 2 million networks?
What is the correct answer?
4
Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?
What is the correct answer?
4
In ________ routing, the tunnel creates a bridge through areas that do not support
multicast traffic.
C. Border Gateway Protocol
What is the correct answer?
4
Which cable type is immune to outside interference and crosstalk?
What is the correct answer?
4
Videoconferencing is an example for…………………… communication
What is the correct answer?
4
What is the maximum length of thinnet cable before a signal booster is needed?
What is the correct answer?
4
Which type of BGP message is sent by a system to notify another router of the senders existence?
What is the correct answer?
4
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….
What is the correct answer?
4
Which of the following is the port used by SMTP?
What is the correct answer?
4
Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
D. Control Message Protocol
What is the correct answer?
4
Which of the following application uses 1.5 Mbps bandwidth?
A. High speed internet browsing
B. Recording for later viewing
D. One(1)high definition TV(HDTV)
What is the correct answer?
4
_____________________ are set up to fulfill service ordering, service assurance, and
billing functions.
D. Complex Operation Support Systems (OSS)
What is the correct answer?
4
The packet transmit using standard Internet Protocol(IP) throughout the Internet by
What is the correct answer?
4
--------------- is/are used for error detection.
What is the correct answer?
4
Which of the following protocol is used by Integrated Services for signaling of the
reservation messages?
B. Distance Vector Multicast Routing Protocol (DVMRP)
C. Resource Reservation Protocol (RSVP)
D. Static routing protocols
What is the correct answer?
4
Which of the following can translate between dissimilar protocols and network types?
What is the correct answer?
4
AppleTalk protocol configures hosts in zones on the network.
What is the correct answer?
4
In an active mode if any FTP client sends the port command "PORT 192,168,0,1,4,1" then
what will be the interpretation of port field?
What is the correct answer?
4
Which function is not supported by E-mail?
What is the correct answer?
4
Which of the following are not the standard representations defined by Telnet protocol?
What is the correct answer?
4
Which of the following protocol was developed to overcome limitations of Routing
Information Protocol (RIP)?
A. Border Gateway Protocol (BGP)
B. Exterior Gateway Protocol (EGP)
C. Enhanced Interior Gateway Routing Protocol (EIGRP)
D. Open Shortest Path First (OSPF)
What is the correct answer?
4
………………….is a technique of conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.
What is the correct answer?
4
FDDI operates on 100 Mbps.
What is the correct answer?
4
A time exceeded message is generated if ………………………………………………….
A. The round trip time between hosts is close to zero.
B. The Time-to Live field has a zero value.
C. Fragments of a message do not arrive within a set time