Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size
1 2565A server who performs processing for client computers is called? a. application server b. file/print server
1 3227You have a dial up connection and want to use error correction and compression. Which protocol do you use? (choose all that apply): a. DLC b. XNS c. SLIP d. PPP
1 2925Which protocol is used in packet switching to find the shortest route and most cost effective, measure hops?
1 2576You are installing a 100BaseTX FastEthernet network in a 1-story building. The company has 100 of workstations. The rooms have 1 meter raised ceilings. What cable would you use: a. Coax b. Type 5 UTP c. UTP d. STP
1 2480What is a characteristic of 802.3 10BaseT standard a. RJ11 Connector at both ends b. UTP RJ45 c. BNC T-connector d. 50 Ohm
1 2980
Define one basic requirement for establishing vlans?
What is FXO and FXS?
What is the structure and use of internet addresses?
What are the 4 layers of tcp ip?
What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP or IP?
Response of switch when we send different vlan data from different port using same mac id.
when I issue the "show ip route bgp" command, I see my routes being learned via ospf and bgp. How can I verify on the nx-os which one will always be used and which one is a backup?
Define tcp/ip?
Which layer is used to convert packets to frame
What is port 8080 typically used for?
Explain dns?
What is looping and how switching loops are avoided at L2 level?
When creating a static route, what is the gateway used to define?
What is the use of NTP?
How does ransomware work?