Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.
1 3251What provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable.
1 2714A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
1 2744A modem modulates digital signals into analog and __ analog signals back into digital signals.
1 2862Which communication is not synchronized and uses a start and stop bit to separate character strings.
1 2788Your network's id is 128.251.6.0 and subnet mask 255.255.255.0 . What is most likely your router's IP address ?
1 2976
Explain Q.931 and its use.
What are the various classes of IP addressing? Calculate the maximum number of class A, B and C network Ids.
Explain clustering support
iam doing my final year graduation in physics i got placed as an assistant engineer for the job band INFRASTRUCTURE MANAGEMENT SERVICE(IMS)i want to know what type of job is tat and i also want to know about the technical knowledge for the job
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
whtch file system support the tcp/ip , http protocal and ftp protocal?
What is the purpose of routing protocol?
How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?
Write short note on any four of the following:
How do I find my ip address in terminal?
Describe vpn?
What is difference between tcp and udp socket?
What is threat-focused ngfw?
Define nat?
Define rip?