Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Networking Administration Interview Questions
Questions Answers Views Company eMail

On a connectionless protocol , how does error recovery and flow control get taken care of ? a. A different protocol has to run along side b. error recovery and flow control are not taken care of c. the upper layers take care of them d. lower layers take care of them

1 2537

PPP has used for multi-protocol support ? a. protocol identifier b. specified bit values c. protocol indicator d. protocol frame length

1 2496

List 3 session layer standards

1 2810

CIDR stands for ? a. Carrier International Domain Routing b. Carrier Independent Domain Routing c. Classless Inter-Domain Routing d. Cross-platform Inter-Domain Routing

1 2539

Class D IP address range an its use? a. 192-223, broadcast b. 224-239, multicast c. 224-255, broadcast d. 192-255, multicast

1 2875

3 purposes of ICMP : a. router discovery b. gurantee of transport c. estimate of bandwidth d. error messaging e. diagnostics/testing f. gurantee of uniqueness of node addresses

1 2534

Fast Ethernet : Max distance for UTP and Fiber ? a. 200m, 1000m b. 1000m, 2000m c. 100m, 1000m d. 100m, 2000m

1 2434

In PPP, which protocol is used to establish and configure a connection ? a. CHAP b. PAP c. LCP d. TCP

1 2684

In PPP, a protocol frame is used for selecting and configuring the network layer protocol ?

1 2591

What does a "preamble" consist of ? a. all 0s b. all 1s c. a 1 in the beginning and rest 0s d. alternating 0s and 1s

1 2959

4 parts of UDP header: a. source IP b. destination IP c. source port d. destination port e. length f. UDP checksum

1 2663

Consider the IP address 128.252.144.84. What is the network id and what is the node id ? assume classful networking. a. 0.0.0.0 and 128.252.144.84 b. 128.0.0.0 and 252.144.84 c. 128.252.0.0 and 144.84 d. 128.252.144.0 and 84

1 3621

The following are the steps toward encapsulation. Put them in order: 1. User input 2. data 3. frame 4. segment 5. datagram 6. bits a. 1-4-2-5-3-6 b. 1-5-4-2-3-6 c. 1-2-3-5-4-6 d. 1-2-4-5-3-6

1 2627

Which IP-class provides the fewest numbers of Hosts? a. Class A b. Class B c. Class C d. Class D

1 6703

You see the following subnet addresses ; what is the subnet mask ? 252.4.0 252.8.0 252.12.0 252.16.0 a. 255.255.255.0 b. 255.255.192.0 c. 255.255.240.0 d. 255.255.252.0

1 2662


Post New Networking Administration Questions

Un-Answered Questions { Networking Administration }

Define proxy servers and how do they protect computer networks?

1029


can i get oracle10g with Linux installation procedure

1938


Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks

1869


Explain the function of the osi session layer?

1037


Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”

1875


Define tracert?

1024


Define ipconfig?

1079


Tell me what advantages does fiber optics have over other media?

946


Define proxy servers?

1046


What is network management?

1009


What is the last major networking problem you troubleshot and solved on your own in the last year?

1912


Explain the importance of implementing a fault tolerance system? Are there limitations?

1053


Define rsa algorithm?

1121


How a switch will identify that it has received a STP packet

2430


How to securing a computer network?

1007