Related Questions
What is the correct answer?
4
In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?
A. Non-authenticated state
What is the correct answer?
4
A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?
What is the correct answer?
4
Which of the following provides a structure for conveying message through TCP/IP network
to host?
A. Address Resolution protocol (ARP)
B. Internet Control Message Protocol (ICMP)
C. Bootstrap Protocol (BOOTP)
D. Dynamic Host Configuration Protocol (DHCP)
What is the correct answer?
4
You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should
A. Use Ipconfig /release to release the old DHCP address.
B. Use Winipcfg and click Release to release the old DHCP address.
C. Use Ifconfig to initialize the NIC.
D. Use Tracert to determine the problem.
What is the correct answer?
4
------------------- is/ are caused by the random motion of the electrons in a wire and is unavoidable.
What is the correct answer?
4
The worldwide Internet is a well-known example of ------------------.
What is the correct answer?
4
127.0.0.1 address is reserved for internal loopback functions.
What is the correct answer?
4
____________ was developed to support aggregation and summarization of routing
information.
A. Static Routing protocol
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Routing Information Protocol (RIP)
D. Border Gateway Protocol (BGP)
What is the correct answer?
4
In FTP, to execute a file transfer, the user begins by _________.
A. Navigating the directory structure
B. Connecting to a remote host
C. Listing files available for transfer.
D. Defining the transfer mode
What is the correct answer?
4
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….
What is the correct answer?
4
What is the distance limitation of Cat5 UTP?
What is the correct answer?
4
What is the default subnet mask for a class A network?
What is the correct answer?
4
Destination physical address in ARP request is a ………………………….address.
What is the correct answer?
4
In TCP segment format _______indicates start of data.
What is the correct answer?
4
Transmission medias are classified into two main categories, which are -------------- and --------------------.
D. synchronous, Asynchronous
What is the correct answer?
4
In the symmetric-key method of cryptography, which key is publicly known?
What is the correct answer?
4
________is a multicast extension to OSPF Version 2.
A. Multicast Source Discovery Protocol (MSDP)
B. Distance Vector Multicast Routing Protocol (DVMRP)
C. Multicast OSPF (MOSPF)
D. Internet Group Management Protocol (IGMP)
What is the correct answer?
4
Which of the following provides control over multimedia sessions?
A. Session Initiation Protocol (SIP)
B. Session Description Protocol (SDP)
C. Session Announcement Protocol (SAP)
D. Real-time Control Protocol (RTCP)
What is the correct answer?
4
T1 makes up 24 channels.
What is the correct answer?
4
Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?
What is the correct answer?
4
When collection of various computers seems a single coherent system to its client, then it is called
What is the correct answer?
4
What is the IEEE specification for Ethernet?
What is the correct answer?
4
Which of the following is defined in RFC 4366?
A. Secure File Trasfer Protocol (SFTP)
B. Trivial File Transfer Protocol (TFTP)
C. File Transfer Protocol (FTP)
D. Transport Layer Security (TLS)
What is the correct answer?
4
A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16. The router cannot find the destination IP address in its routing table. Which ICMP message should be sent?
C. Destination Unreachable
D. Parameter problem on a datagram
What is the correct answer?
4
Which of the following is a media type that is most susceptible to interference?
A. Shielded twisted pair (STP)
C. Unshielded twisted pair (UTP)
What is the correct answer?
4
How many number of host/machine can be attached to a network using a class B address?
What is the correct answer?
4
Which of the following protocols is described in RFC 793?
A. Address Resolution Protocol (ARP)
B. Transmission Control Protocol (TCP)
C. Bootstrap Protocol (BOOTP)
D. User Datagram Protocol (UDP)
What is the correct answer?
4
What can be used in the place of DNS to resolve host names to IP addresses?
What is the correct answer?
4
What is used to boost a digital signal?
What is the correct answer?
4
TCP protocol is responsible for logical addressing and delivery of packets.