Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) You have a class C subnet. You would like divide it up into subnets by "subnetting". You have to have at least 24 nodes per subnet. How many subnets can you have ? a. 2 b. 6 c. 7 d. 8 e. 14
1 2900Your class C network has been subnet-ed. Mask for the new subnets is 255.255.255.248. How many subnets and how many nodes per subnet can you have ? a. 30, 6 b. 30, 7 c. 62, 2 d. 62, 6 e. 62, 7
1 2686Your previous Network Administrator had subnneted your Class C network into many subnets. Only info you have is that the mask was 255.255.255.224 How many subnets did he make ? How many nodes were there per subnet ? a. 2, 62 b. 7, 30 c. 6, 30 d. 6, 62 e. 7, 62
1 2479You have a class B subnet. You would like divide it up into 5 more subnets by "subnetting". However you also have to have at least 6000 hosts per subnet. Can you do it ? a. Yes b. No.
1 2620Class E IP address range and its use ? a. 240-255, experimental b. 224-239, multicast c. 224-255, multicast d. 192-255, experimental
1 3834How long is MAC address (bytes) ? How may bytes identifies the vendor? a. 8,2 b. 6,3 c. 8,4 d. 6,2
1 2733What is a "preamble" in IEEE 802.3 frame? a. an indication of the end of a frame b. an indication of the start of a new frame c. an indication of congestion d. an indication of a corrupted frame
1 2843ICMP redirects are sent from _ to __ ? a. DTE, DCE b. DCE, CTE c. host, router d. router, host
1 3014What protocol is used to convert IP addresses to MAC addresses ? a. IP b. ARP c. RARP d. InARP e. appletalk
1 3429What is flow control ? a. To keep the transmitting device from transmitting no faster than the receiving device can receive. b. To find the best route to a destination c. To determine which machine transmits packets on the wire on a given instance. d. To be able to send a beacon message when congestion occurs.
1 2633Your previous Network Administrator had subnetted your network into many subnets. Only info you have is that one of the hosts IP was 200.252.144.33 and the mask was 255.255.255.240. Which class network is it ? How many bits are being subnetted ? What is the broadcast address ? a. B, 28, 255.255.255.47 b. C, 20, 255.255.255.47 c. C, 28, 255.255.255.47 c. C, 28, 255.255.255.32
1 2735Default subnet mask for Class A, B, and C ? a. 0.255.255.255, 0.0.255.255, 0.0.0.255 b. 255.0.0.0 , 255.255.0.0, 255.255.255.0 c. 255.255.255.0, 255.255.0.0, 255.0.0.0 d. 0.0.0.0, 0.0.0.255, 0.0.255.255
1 2763You have a class B network 172.16.0.0. You use a 11 bits for subnetting. Which of the following is a correct range of Ip addresses that belong to the same network. a. 255.255.8.1 to 255.255.14.254 b. 255.255.255.9 to 255.255.255.14 c. 255.255.17.1 to 255.255.22.254 d. 255.255.17.0 to 255.255.22.255
1 3310
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
What is the structure and use of internet addresses?
What ftp means?
What is private ip address?
Define the role of ieee in computer networking?
What is the advantage of udp over tcp?
What is domain name system (dns)?
What is the difference between cybersecurity and information security?
What is the full form of osi and tcp/ip model?
HI all of u dear freind i dont know abot u but instead of i want to requeste to all , if u have any job in ur mind than pls contact me or forword me . i hv complet my B.A. , CCNA ,MCSA, my contact no 09958737018 and id is mak_alam000@rediffmail.com , ur freind maksud alam
Explain two-phase locking protocol.
Explain which layer is closer to the user?
What are the main advantages of routing in switched network technique?
Explain the major disadvantage of a star topology?
What are the two reasons for using layered protocols?