Home

Which of the following is a media type that is most susceptible to interference?

A. Shielded twisted pair (STP)

B. Fiber optics

C. Unshielded twisted pair (UTP)

D. Coaxial

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. 17. Which of the following use default routes for inter-domain routing?
  2. In FTP, to execute a file transfer, the user begins by _________.
  3. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…
  4. Which of the following is a simplex protocol?
  5. …………………… have a single communication channel that is…
  6. Your network has gotten a single class C address but has 300 computers. How can you connect them to…
  7. Select the standard for token ring using token-passing media access.
  8. AppleTalk protocol configures hosts in zones on the network.
  9. The key concern in the design of transmission system is -------------- and ---------------
  10. E-mail is an example of ………………………… mode…
  11. Which field in Domain Name System message format specifies the class of query?
  12. Which cable type is immune to outside interference and crosstalk?
  13. Which of the following transmission media suffers more from transmission impairment?
  14. …………………………..combines characteristics of…
  15. How many number of host/machine can be attached to a network using a class B address?
  16. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…
  17. Which of the following filed represents the sender of the message in an electronic mail?
  18. Which layer of the OSI model does a switch operate in?
  19. In TCP segment format _______indicates start of data.
  20. Which type of connector is used on 10Base2 networks?
  21. What is the default subnet mask for a class A network?
  22. When collection of various computers seems a single coherent system to its client, then it is called…
  23. What is the maximum length of thick Ethernet cable before a signal booster is needed?
  24. Which of the following can be used to transfer files from a Unix server?
  25. Which of the following states suggests that the connection has been ended either at the request of the…
  26. ___________ is based on resources that are present within the Diffserv region.
  27. Which is the port used by HTTPS?
  28. Using a class B address maximum of …………………networks can be…
  29. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line…
  30. Which is the port used by POP3?