Related Questions
What is the correct answer?
4
In flags message attribute, which of the following flag indicates that message has been
completed?
What is the correct answer?
4
What is the default subnet mask for a class A network?
What is the correct answer?
4
What is the range of multicast addressing?
A. 223.0.0.0 through 240.255.255.255
B. 244.0.0.0 through 239.255.255.266
C. 224.1.1.1 through 239.555.255.255
D. 224.0.0.0 through 239.255.255.255
What is the correct answer?
4
Which of the following is also known as IP masquerading?
A. Fiber Distributed Data Interface (FDDI)
B. Network Address Translation (NAT)
C. Classless Inter-Domain Routing (CIDR)
What is the correct answer?
4
Which OSI model layer provides for encryption and decryption of data?
What is the correct answer?
4
Which Layer is Responsible for Congestion Control?
What is the correct answer?
4
Where are routing tables placed?
A. in network interface card
What is the correct answer?
4
Which of the following is a media type that is most susceptible to interference?
A. Shielded twisted pair (STP)
C. Unshielded twisted pair (UTP)
What is the correct answer?
4
Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?
C. TCP/IP transport layer
What is the correct answer?
4
Which of the following provides the service for any casting?
What is the correct answer?
4
----------------is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.
What is the correct answer?
4
This mapping of name to IP address is done by …………………………….
A. Address resolution protocol
C. reverse address resolution protocol
What is the correct answer?
4
When collection of various computers seems a single coherent system to its client, then it is called
What is the correct answer?
4
Which of the following states suggests that the connection has been ended either at the
request of the client or for any other reason?
D. Non-authenticated state
What is the correct answer?
4
--------------- is/are used for error detection.
What is the correct answer?
4
You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?
What is the correct answer?
4
Which of the following SIP request terminates a call?
What is the correct answer?
4
Which class does the IP address 202.119.22.31 belong to?
What is the correct answer?
4
802.5 project standard defines Token Ring.
What is the correct answer?
4
What is the default subnet mask for a class A network?
What is the correct answer?
4
AppleTalk protocol configures hosts in zones on the network.
What is the correct answer?
4
Which type of connector is used on 10Base2 networks?
What is the correct answer?
4
________acts as source and destination for IP traffic.
What is the correct answer?
4
80 is the well-known port number for the HTTP service.
What is the correct answer?
4
A node, which is more powerful, and can handle local information processing or graphics processing is called a------------------.
C. Network Operating System
What is the correct answer?
4
What is the distance limitation of Cat5 UTP?
What is the correct answer?
4
___________ is based on resources that are present within the Diffserv region.
What is the correct answer?
4
At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
What is the correct answer?
4
Class C network address class supports 65,534 hosts.
What is the correct answer?
4
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….