What is the UDP datagram format?
A. Source Port - 16 bits, Destination Port - 16 bits, Length
- 16 Bits, Checksum - 16 bits, Data
B. Destination Port - 16 bits, Source Port - 16 bits, Length
- 16 Bits, Checksum - 16 bits, Data
C. Source Port - 16 bits, Destination Port - 16 bits,
Checksum - 16 Bits, Length - 16 bits, Data
D. Source Port - 8 bits, Destination Port - 8 bits, Length -8
Bits, Checksum - 8 bits, Data
Answer / guest
Answer: A
The UDP format for a segment is as follows:
Source Port 16 bits
Destination Port 16 bits
Length 16 bits
Checksum 16 bits
Data xx bits
| Is This Answer Correct ? | 8 Yes | 0 No |
The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters
In which layer switch is work?
What is a network subnet?
how to troubleshoot when protocols is down and link is not getting up
Can you explain VPN tunneled packet in detail?
Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.
Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255
What type of Ethernet operation allows only one entity to transmit at a time? For example, if someone else is transmitting, they must wait. A.) Full-Duplex B.) Dual-Duplex C.) Half-Duplex D.) Latex E.) Quarter-Duplex F.) Suplex
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??
Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.
In port based access-list which command u give instead of ip?