Related Questions
What is the correct answer?
4
Which of the following is required to communicate between two computers?
A. Communications software
C. Communication hardware
D. All of the above including access to transmission medium
What is the correct answer?
4
Which of the following can be used to transfer files from a Unix server?
What is the correct answer?
4
What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.
What is the correct answer?
4
What is the distance limitation of Cat5 UTP?
What is the correct answer?
4
What is the maximum frame size of a frame relay?
What is the correct answer?
4
80 is the well-known port number for the HTTP service.
What is the correct answer?
4
25 is used by SMTP
What is the correct answer?
4
Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.
What is the correct answer?
4
Which of the following connectors is used by UTP on a Fast Ethernet network?
What is the correct answer?
4
Which of the following is required to communicate between two computers?
A. Communications software
C. Communication hardware
D. All of the above including access to transmission medium
What is the correct answer?
4
Which directory service is used in Windows 2000 Server?
What is the correct answer?
4
How many table entries are supported by global routing table in CIDR?
What is the correct answer?
4
____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.
A. Enhanced Interior Gateway Routing Protocol (EIGRP)
B. User Datagram Protocol (UDP)
C. Border Gateway Protocol (BGP)
D. User Datagram Protocol (UDP)
What is the correct answer?
4
In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.
What is the correct answer?
4
What is the default port for Telnet?
What is the correct answer?
4
OSPF is based on …………………
A. Distance vector routing
What is the correct answer?
4
_____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol
What is the correct answer?
4
What is attenuation?
C. loss of signal strength
D. unwanted signals on the network
What is the correct answer?
4
You have a network card with only one connector, which looks like a place to plug an oversized phone cord. What type of card is it?
What is the correct answer?
4
_______ Domain name corresponds to US military.
What is the correct answer?
4
preamble field of 802.3 frames is encoded using ------------------- encoding
B. differential Manchester
What is the correct answer?
4
How many layers are there in the OSI model?
What is the correct answer?
4
Which type of connector is used on 10Base2 networks?
What is the correct answer?
4
This mapping of name to IP address is done by …………………………….
A. Address resolution protocol
C. reverse address resolution protocol
What is the correct answer?
4
25 is used by SMTP
What is the correct answer?
4
What is the maximum distance of single-mode fiber (SMF)?
What is the correct answer?
4
In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
What is the correct answer?
4
A financial institution that issues the card to the purchaser is ________.
C. Acquirer payment gateway
What is the correct answer?
4
A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?
What is the correct answer?
4
80 is the well-known port number for the HTTP service.