PPP supports which of the following features? a. encryption b. login c. password d. error correction
1 2476What does the receiving host do with packets when it is using a connection-oriented protocol ? a. acknowledges only the first and last packet, puts the packets in their proper order. b. acknowledges only the first and last packet, discards in any packet that have arrived out of sequence. c. acknowledges each packet and puts the packets in their proper order. d. acknowledges each packet and discards in any packet that have arrived out of order
1 2733You have a Solaris host that acts as the DNS server. Which process (daemon) must this Solaris host be running ? a. dnsd b. dns c. named d. nameserver -d
1 2758Solaris machines more often than not runs routed daemon. routed is the unix equivalent of RIP. It is always run with -q option. Why ? a. q options optimizes the process b. q option uses a default route c. q option only activates itself in the absence of a default router d. q option tells the process not to advertise any routes. It just listens to the RIP udates. That way it does not interfere with router in the subnet.
1 2695What is the difference between 802.2 and 802.3 frames ? a. 802.3 = 802.2 + LLC Header Info b. 802.2 = 802.3 + LLC Header Info c. 802.2 = 802.3 + Length field c. 802.3 = 802.2 + Length field
1 3926IP classes and their ranges (A-C): a. 1-127, 128-191, 192-223 b. 1-127, 128-191, 192-254 c. 1-126, 128-192, 193-223 d. 1-126, 128-191, 192-223
1 3549Name 3 problems with distance-vector protocol ? a. not feasible for small internetwork b. count-to-infinite c. routing loops d. inconsistent views of network
1 2216You have a class C subnet. You would like divide it up into 8 more subnets by "subnetting" ? What would be the subnet mask ? a. 255.255.255.192 b. 255.255.255.224 c. 255.255.255.240 d. 255.255.255.248 d. 255.255.255.252
1 2484You have a class C subnet. You would like divide it up into 5 more subnets by "subnetting" . How many hosts can you have per subnet ? a. 30 b. 31 c. 30 d. 62 e. 126
1 2518You have a class C subnet. You would like divide it up into 5 more subnets by "subnetting". However you also have to have at least 31 hosts per subnet. Can you do it ? a. Yes b. No
1 2465You have divided your class C network into 6 subnets. Your subnet mask is 255.255.255.224. What are the ranges of IPs for your subnets ? Your Network address before subnetting was 200.252.144.0 a. 32-62, 64-93, 96-125, 128-157, 160-189, 192-221 b. 33-63, 65-94, 97-126, 129-158, 161-190, 193-222 c. 34-64, 66-95, 98-127, 130-159, 162-191, 194-223 d. 35-65, 67-96, 99-128, 131-160, 163-192, 195-224
1 2803You have a class B subnet. You would like divide it up into 5 more subnets by "subnetting" . How many hosts can you have per subnet ? a. 30 b. 1022 c. 2046 d. 4094 e. 8190
1 2609Best example of Flat Addressing Scheme among the following ? a. MAC addresses b. Classless IP addresses c. Classful IP addresses d. IPX addresses
1 28742 examples of a packet-switched network. a. public telephone network b. ethernet network c. token-ring network d. ATM network
1 2463Post New Networking Administration Questions
I am using solaris box, I need to delete a file from path /usr/tmp/ which r older than 24 hours?
What is the the advantage of address sharing?
how to add additional instances sar r3, what are the steps to take server is down.
When you connect two redundant links of switch to hub to form a loop , and when the switch receives its own BPDU what it will do.
Tell me about your job profile.
Explain the difference between straight-through and crossover cable?
Explain netstat?
Explain subnet mask?
What is the last major networking problem you troubleshot and solved on your own in the last year?
How do two computers communicate with each other when they are connected through L2 or L3 switch?
What can be considered as good passwords?
Tell me what protocols fall under the application layer of the tcp/ip stack?
all your interview question in networking and system administration
Define the number of network ids in a class c network?
What are the drawbacks of implementing a ring topology?