Home

Which of the following is defined in RFC 4366?

A. Secure File Trasfer Protocol (SFTP)

B. Trivial File Transfer Protocol (TFTP)

C. File Transfer Protocol (FTP)

D. Transport Layer Security (TLS)

You can do it
  1. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain…
  2. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  3. In FTP, to execute a file transfer, the user begins by _________.
  4. Which type of BGP message is sent by a system to notify another router of the senders existence?
  5. Which cable type is immune to outside interference and crosstalk?
  6. FDDI operates on 100 Mbps.
  7. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  8. ____________ developed to provide a loop-free method of exchanging routing information between autonomous…
  9. Data Transmission is not a layer in the OSI model
  10. Which of the following is a simplex protocol?
  11. At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
  12. Thick Ethernet cable uses what type of connector? Select all that apply.
  13. Which is the port used by POP3?
  14. Which of the following protocol resolves a host's hardware address for a known IP address?
  15. ___________ is based on resources that are present within the Diffserv region.
  16. Destination physical address in ARP request is a ………………………….address.
  17. Which of the following is the IEEE specification for wireless networks?
  18. How many table entries are supported by global routing table in CIDR?
  19. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  20. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
  21. In 1996, 36.44% of _________ addresses were brought in use.
  22. TCP protocol is responsible for logical addressing and delivery of packets.
  23. ADSL uses high-speed Internet service phone lines
  24. Which of the following is also known as IP masquerading?
  25. _____________________ are set up to fulfill service ordering, service assurance, and billing functions.
  26. What are the subnet mask in dotted decimal notation for /20 networks?
  27. What does a patch cable connect to within an Ethernet network?
  28. What is used to boost a digital signal?
  29. OSPF is based on …………………
  30. Which of the following delivery methods works with only one source and one destination? Multicast