Related Questions
What is the correct answer?
4
In the symmetric-key method of cryptography, which key is publicly known?
What is the correct answer?
4
T1 makes up 24 channels.
What is the correct answer?
4
What is the default port for Telnet?
What is the correct answer?
4
Which layer of the OSI model does a switch operate in?
What is the correct answer?
4
Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of
servers?
What is the correct answer?
4
Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire
What is the correct answer?
4
Which type of BGP message is sent by a system to notify another router of the senders existence?
What is the correct answer?
4
Which of the following is required to communicate between two computers?
A. Communications software
C. Communication hardware
D. All of the above including access to transmission medium
What is the correct answer?
4
TCP protocol is responsible for logical addressing and delivery of packets.
What is the correct answer?
4
Telnet protocol uses ___________ representation for the function Synchronize.
What is the correct answer?
4
In the IP address 129.2.8.9, what does 129.2 specify?
What is the correct answer?
4
Which of the following is used for testing the data-link connection in a PPP network?
A. Link Control Protocol (LCP)
C. Network Control Protocols (NCPs)
D. Basic Rate Interface (BRI)
What is the correct answer?
4
----------------is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.
What is the correct answer?
4
Which of the following IEEE specifications uses CSMA/CD?
What is the correct answer?
4
Which of the following transmission media suffers more from transmission impairment?
What is the correct answer?
4
Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
D. Control Message Protocol
What is the correct answer?
4
What is the maximum length of thick Ethernet cable before a signal booster is needed?
What is the correct answer?
4
ICMP messages require ………………. levels of encapsulation
What is the correct answer?
4
Which of the following filed represents the sender of the message in an electronic mail?
What is the correct answer?
4
The Point-to-Point Protocol (PPP) is described in which of the following?
What is the correct answer?
4
Class C network address class supports 65,534 hosts.
What is the correct answer?
4
25 is used by SMTP
What is the correct answer?
4
Which is the port used by HTTPS?
What is the correct answer?
4
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….
What is the correct answer?
4
In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
What is the correct answer?
4
You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain name resolution?
A. Contoso.com, contoso.org, microsoft.com, com
B. Contoso.com, org, microsoft.org, org
C. Contoso.org, org, root [.], com, microsoft.com
D. Microsoft.com, com, org, contoso.org
What is the correct answer?
4
T1 makes up 24 channels.
What is the correct answer?
4
How many 64-Kbps channels are used on an ISDN BRI?
What is the correct answer?
4
What is the maximum distance of single-mode fiber (SMF)?
What is the correct answer?
4
Which of the following use default routes for inter domain routing?