Which protocol carries messages such as destination
Unreachable, Time Exceeded, Parameter Problem, Source
Quench, Redirect, Echo, Echo Reply, Timestamp, Information
Request, Information Reply, Address Request, and Address
Reply?
A. ICMP
B. UDP
C. TCP
D. TFTP
E. FTP
Answers were Sorted based on User's Feedback
Answer / m haja bahurudeen
Ans :A
Internet control message protocol
ICMP operate - Layer3
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / guest
Answer: A
ICMP (Internet Control Message Protocol) is a
network layer internet protocol described in RFC # 792.
ICMP reports IP packet information such as destination
Unreachable, Time Exceeded, Parameter Problem, Source
Quench, Redirect, Echo, Echo Reply, Timestamp, Information
Request, Information Reply, Address Request, and Address
Reply.
| Is This Answer Correct ? | 1 Yes | 0 No |
Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
Which element is used to define the rate in bits per second that a Frame Relay switch agrees to transfer data? A. clock rate (CP) B. Committed Information Rate (CIR) C. Local Management Interface (LMI) D. data link connection identifier (DICI) E. Committed Rate Measurement Intercal (CRIMI)
What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place
Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP
frends i am suffring from newfolder.exe virus in my server 2000 win how i have to remove it plz help me Jitendera sinha
What is network?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
what is the difference between client mode and server mode of vtp and what is the diffrence betwwen tarnsparent mode and server mode
What is etherchannel?
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP
What is masking? why is needed?