What is the range of multicast addressing?

A. through

B. through

C. through 239.555.255.255

D. through

You can do it
  1. …………………………..combines characteristics of…
  2. ________allows receiver to inform sender about the successful receiving of all the segments.
  3. Which of the following transmission media suffers more from transmission impairment?
  4. TCP protocol is responsible for logical addressing and delivery of packets.
  5. Data Transmission is not a layer in the OSI model
  6. Which of the following delivery methods works with only one source and one destination? Multicast
  7. OSPF is based on …………………
  8. Which of the following is the IEEE specification for wireless networks?
  9. In Integrated services model, ________ corresponds to token bucket filter.
  10. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  11. Which is the port used by HTTPS?
  12. Which of the following protocols is described in RFC 793?
  13. Which directory service is used in Windows 2000 Server?
  14. Which of the following connectors is used by UTP on a Fast Ethernet network?
  15. Which of the following provides control over multimedia sessions?
  16. What is the default subnet mask for a class A network?
  17. Which of the following algorithms are meant for establishing the paths through the network?
  18. What layer of the OSI protocol reference model does a bridge operate under?
  19. ___________ is based on resources that are present within the Diffserv region.
  20. In distance vector routing an active router sends out information ………………………….
  21. What is the code used for Interpret As Command (IAC)?
  22. 80 is the well-known port number for the HTTP service.
  23. What is the maximum frame size of a frame relay?
  24. Which of the following pieces of equipment will receive a packet from one port and forward that packet…
  25. Which of the following can be used to transfer files from a Unix server?
  26. Which of the following was initially designed as a video and audio compression standard?
  27. Which of the following protocols are considered unreliable or connectionless?
  28. How many number of host/machine can be attached to a network using a class B address?
  29. In the symmetric-key method of cryptography, which key is publicly known?
  30. Which of the following is used for testing the data-link connection in a PPP network?