Related Questions
What is the correct answer?
4
A time exceeded message is generated if ………………………………………………….
A. The round trip time between hosts is close to zero.
B. The Time-to Live field has a zero value.
C. Fragments of a message do not arrive within a set time
What is the correct answer?
4
Which of these is an example for unguided transmission?
What is the correct answer?
4
A node, which is more powerful, and can handle local information processing or graphics processing is called a------------------.
C. Network Operating System
What is the correct answer?
4
Which of the following is used for establishing, configuring, and testing the data-link
Link Control Protocol (LCP)
B. Network Control Protocols (NCPs)
C. Link Control Protocol (LCP)
D. File transfer protocol(FTP)
What is the correct answer?
4
Transmission medias are classified into two main categories, which are -------------- and --------------------.
D. synchronous, Asynchronous
What is the correct answer?
4
You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?
What is the correct answer?
4
What are the subnet mask in dotted decimal notation for /20 networks?
What is the correct answer?
4
Which class does the IP address 202.119.22.31 belong to?
What is the correct answer?
4
What is the maximum length of thick Ethernet cable before a signal booster is needed?
What is the correct answer?
4
You wish to install a 100BaseT network. What type of cabling will you use?
What is the correct answer?
4
Which of the following is the IEEE specification for wireless networks?
What is the correct answer?
4
_______ Domain name corresponds to US military.
What is the correct answer?
4
Class C network address class supports 65,534 hosts.
What is the correct answer?
4
Which of the following filed represents the sender of the message in an electronic mail?
What is the correct answer?
4
Which of the following address supports 254 hosts on each of 2 million networks?
What is the correct answer?
4
_____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol
What is the correct answer?
4
25 is used by SMTP
What is the correct answer?
4
Which of the following application uses 1.5 Mbps bandwidth?
A. High speed internet browsing
B. Recording for later viewing
D. One(1)high definition TV(HDTV)
What is the correct answer?
4
When collection of various computers seems a single coherent system to its client, then it is called
What is the correct answer?
4
E-mail is an example of ………………………… mode of communication where one party can send a note to another person and the recipient need not be online to receive the e-mail.
What is the correct answer?
4
What is the code used for Interpret As Command (IAC)?
What is the correct answer?
4
Strings enclosed in _______ quotation marks indicate single tokens.
What is the correct answer?
4
What is the default subnet mask for a class B network?
What is the correct answer?
4
What is the maximum length of thinnet cable before a signal booster is needed?
What is the correct answer?
4
Which cable type is immune to outside interference and crosstalk?
What is the correct answer?
4
What is the distance limitation of Cat5 UTP?
What is the correct answer?
4
TCP protocol is responsible for connection-oriented communication
What is the correct answer?
4
AppleTalk protocol configures hosts in zones on the network.
What is the correct answer?
4
The special address 'THIS HOST' is referred to as
What is the correct answer?
4
T1 makes up 24 channels.