On a connectionless protocol , how does error recovery and flow control get taken care of ? a. A different protocol has to run along side b. error recovery and flow control are not taken care of c. the upper layers take care of them d. lower layers take care of them
1 2537PPP has used for multi-protocol support ? a. protocol identifier b. specified bit values c. protocol indicator d. protocol frame length
1 2496CIDR stands for ? a. Carrier International Domain Routing b. Carrier Independent Domain Routing c. Classless Inter-Domain Routing d. Cross-platform Inter-Domain Routing
1 2539Class D IP address range an its use? a. 192-223, broadcast b. 224-239, multicast c. 224-255, broadcast d. 192-255, multicast
1 28753 purposes of ICMP : a. router discovery b. gurantee of transport c. estimate of bandwidth d. error messaging e. diagnostics/testing f. gurantee of uniqueness of node addresses
1 2534Fast Ethernet : Max distance for UTP and Fiber ? a. 200m, 1000m b. 1000m, 2000m c. 100m, 1000m d. 100m, 2000m
1 2434In PPP, which protocol is used to establish and configure a connection ? a. CHAP b. PAP c. LCP d. TCP
1 2684What does a "preamble" consist of ? a. all 0s b. all 1s c. a 1 in the beginning and rest 0s d. alternating 0s and 1s
1 29594 parts of UDP header: a. source IP b. destination IP c. source port d. destination port e. length f. UDP checksum
1 2663Consider the IP address 128.252.144.84. What is the network id and what is the node id ? assume classful networking. a. 0.0.0.0 and 128.252.144.84 b. 128.0.0.0 and 252.144.84 c. 128.252.0.0 and 144.84 d. 128.252.144.0 and 84
1 3621The following are the steps toward encapsulation. Put them in order: 1. User input 2. data 3. frame 4. segment 5. datagram 6. bits a. 1-4-2-5-3-6 b. 1-5-4-2-3-6 c. 1-2-3-5-4-6 d. 1-2-4-5-3-6
1 2627Which IP-class provides the fewest numbers of Hosts? a. Class A b. Class B c. Class C d. Class D
1 6703You see the following subnet addresses ; what is the subnet mask ? 252.4.0 252.8.0 252.12.0 252.16.0 a. 255.255.255.0 b. 255.255.192.0 c. 255.255.240.0 d. 255.255.252.0
1 2662Post New Networking Administration Questions
Define proxy servers and how do they protect computer networks?
can i get oracle10g with Linux installation procedure
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
Explain the function of the osi session layer?
Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”
Define tracert?
Define ipconfig?
Tell me what advantages does fiber optics have over other media?
Define proxy servers?
What is network management?
What is the last major networking problem you troubleshot and solved on your own in the last year?
Explain the importance of implementing a fault tolerance system? Are there limitations?
Define rsa algorithm?
How a switch will identify that it has received a STP packet
How to securing a computer network?