Related Questions
What is the correct answer?
4
The key concern in the design of transmission system is -------------- and ---------------
What is the correct answer?
4
Which of the following filed represents the sender of the message in an electronic mail?
What is the correct answer?
4
Which layer of the OSI model does a switch operate in?
What is the correct answer?
4
What is attenuation?
C. loss of signal strength
D. unwanted signals on the network
What is the correct answer?
4
What is used to boost a digital signal?
What is the correct answer?
4
In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.
What is the correct answer?
4
What layer of the OSI protocol reference model does a bridge operate under?
What is the correct answer?
4
In 1996, 36.44% of _________ addresses were brought in use.
What is the correct answer?
4
What is the distance limitation of Cat5 UTP?
What is the correct answer?
4
Which of the following are not the standard representations defined by Telnet protocol?
What is the correct answer?
4
If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization can have at the most……………. networks and each of these networks that can support only…………………...hosts.
A. 1022 networks, 62 hosts.
B. 62 networks, 1022 hosts.
C. 4094 networks, 14 hosts.
D. 14 networks, 4094 hosts.
What is the correct answer?
4
________acts as source and destination for IP traffic.
What is the correct answer?
4
802.5 project standard defines Token Ring.
What is the correct answer?
4
_______ body looks after the protocol identifiers used over Internet.
A. Transmission Control Protocol
D. Network Control Protocol
What is the correct answer?
4
The Hamming Distance for the codes generated using either even or odd parity will be------------------
What is the correct answer?
4
What is the default subnet mask for a class A network?
What is the correct answer?
4
Which of these cable is/are used to connect devices to hubs and switches.
What is the correct answer?
4
What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.
What is the correct answer?
4
Internet e-mail system based on the ……………………………………………..
B. Simple Mail Transfer Protocol (SMTP)
What is the correct answer?
4
This mapping of name to IP address is done by …………………………….
A. Address resolution protocol
C. reverse address resolution protocol
What is the correct answer?
4
You have a network card with the connector in question 43, and it also has a 9 pin female connector. What type of card is it?
What is the correct answer?
4
What is the maximum length of thick Ethernet cable before a signal booster is needed?
What is the correct answer?
4
____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.
A. Enhanced Interior Gateway Routing Protocol (EIGRP)
B. User Datagram Protocol (UDP)
C. Border Gateway Protocol (BGP)
D. User Datagram Protocol (UDP)
What is the correct answer?
4
A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?
What is the correct answer?
4
Which is the port used by POP3?
What is the correct answer?
4
Telnet protocol uses ___________ representation for the function Synchronize.
What is the correct answer?
4
To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.
What is the correct answer?
4
How many table entries are supported by global routing table in CIDR?
What is the correct answer?
4
Identify the topology and network type that uses a central hub with cables connected to workstations.
A. Physical star topology, Ethernet
B. Physical bus topology, Ethernet
C. Physical ring topology, token ring
D. Physical ring topology, Ethernet
What is the correct answer?
4
Which of the following protocols are considered unreliable or connectionless?