Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) Which of the following methods are used as flow control ? Choose 3 a. Acknowledgements b. Windowing c. Traceroute d. TTL e. Sliding windows
1 2910You have class B network with a 12 bit subnet. How many subnets and how many hosts per subnet are available ? a. 14, 14 b. 14, 4094 c. 4096, 14 d. 4094, 16 e. 4094, 14
1 28544 functions that ICMP protocol performs are: a. echo (ping) b. telnet c. rcp d. rlogin e. rpc f. TTL announce (used by traceroute) g. source quench message (during congestion) h. network error announcement
1 2947Which of the following statements are correct ? a. TCP is connection oriented and UDP is connectionless b. UDP is connection oriented and TCP is connectionless c. Both TCP and UDP are connection-oriented d. Both TCP and UDP are connectionless
1 3247RFC 1542 compliant ROUTERS pass what ? a. DHCP broadcasts b. RIP broadcasts c. RIP2 broadcasts d. multicast packets
1 4694True or False: RJ-45 connectors house less connections then RJ-11 because they are larger in size and use bigger cables.
1 2885True or False: Twisted pair cabling comes in various versions and can support up to 96 ports and transmission speeds of 100 Mbps.
1 2556
Describe one advantage of mesh topology?
salient feature of network administrator
What are the main elements of a protocol?
What is RTP in case of VoIP? Which layer of OSI model does it work on?
Define proxy servers and how do they protect computer networks?
Write short note on any four of the following:
How do you ipconfig all?
Can you tell what do we mean by http protocol?
According to you which is the most important OSI layer?
I am using solaris box, I need to delete a file from path /usr/tmp/ which r older than 24 hours?
Describe point to point link?
Define multicast routing?
Explain the difference between broadcast domain and collision domain?
How does phishing work?
Explain the role of ieee in computer networking?