Home

Which OSI model layer provides for encryption and decryption of data?

A. Data-link

B. Transport

C. Presentation

D. Application

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain…
  2. What does a patch cable connect to within an Ethernet network?
  3. What is the length of MARKER field in BGP message header?
  4. Which is the port used by POP3?
  5. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  6. The Hamming Distance for the codes generated using either even or odd parity will be------------------
  7. A financial institution that issues the card to the purchaser is ________.
  8. In 1996, 36.44% of _________ addresses were brought in use.
  9. What is the maximum size of IP header in the UDP Datagram format?
  10. What can be used in the place of DNS to resolve host names to IP addresses?
  11. Which of the following is used for testing the data-link connection in a PPP network?
  12. 25 is used by SMTP
  13. Which of the following is a media type that is most susceptible to interference?
  14. In distance vector routing an active router sends out information ………………………….
  15. What is the default port for Telnet?
  16. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  17. How many number of host/machine can be attached to a network using a class B address?
  18. Which of the following connectors is used by UTP on a Fast Ethernet network?
  19. A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16.…
  20. When collection of various computers seems a single coherent system to its client, then it is called…
  21. The generic domain name for air transport industry is ________.
  22. 80 is the well-known port number for the HTTP service.
  23. In the symmetric-key method of cryptography, which key is publicly known?
  24. Which of these is a feature of hubs?
  25. Which cable type is immune to outside interference and crosstalk?
  26. What is the default subnet mask for a class A network?
  27. You have a network card with the connector in question 43, and it also has a 9 pin female connector.…
  28. A time exceeded message is generated if ………………………………………………….
  29. Which of the following versions will replace IPv4 Internet layer?
  30. Following are the advantages of tree topologyi) Point-to-point wiring for individual segments.ii) Supported…