Home

Which of the following filed represents the sender of the message in an electronic mail?

A. To

B. From

C. Cc

D. Reply-to

You can do it
  1. Which type of BGP message is sent by a system to notify another router of the senders existence?
  2. Which of the following can be used to transfer files from a Unix server?
  3. What is the distance limitation of Cat5 UTP?
  4. Which of the following can translate between dissimilar protocols and network types?
  5. Which of the following IEEE specifications uses CSMA/CD?
  6. Which of the following is the IEEE specification for wireless networks?
  7. Which of the following connectors is used by UTP on a Fast Ethernet network?
  8. You have a network card with only one connector, which looks like a place to plug an oversized phone…
  9. Which is the port used by HTTPS?
  10. _______ body looks after the protocol identifiers used over Internet.
  11. What is the default subnet mask for a class B network?
  12. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  13. Which of the following is a media type that is most susceptible to interference?
  14. Which cable type is immune to outside interference and crosstalk?
  15. What is the maximum length of thinnet cable before a signal booster is needed?
  16. The idea of sharing one network address among the multiple physical networks can be done using the following…
  17. Which of the following protocols is described in RFC 793?
  18. You have a network card with the connector in question 43, and it also has a 9 pin female connector.…
  19. Which class of IP addressing was not brought in much use?
  20. Telnet protocol uses ___________ representation for the function Synchronize.
  21. Which of the following protocols use a topology table to install routes into the IP routing table?
  22. Which Layer is Responsible for Congestion Control?
  23. Thinnet coaxial cable uses what type of connector?
  24. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  25. UDP datagram has a header, which is of ________.
  26. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  27. 25 is used by SMTP
  28. ________allows receiver to inform sender about the successful receiving of all the segments.
  29. Which of the following is defined in RFC 4366?
  30. Which of the following can be used to transfer files from a Unix server?