Describe End to End network services: (Choose all that apply)
A.) Best Route selection
B.) Accomplished Segment by Segment, each segment is autonomous
C.) Flow Control & Data Integrity
D.) Best efforts packet delivery
Answer / guest
Answer: A B C D
All of the above End to End network services.
Is This Answer Correct ? | 1 Yes | 0 No |
Explain the types of nat?
Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? A. 254 B. 510 C. 126 D. 16,372
how we update the IOS version with the help of TFTP?
what is the reason for creating vlans
friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall
Explain the term 'multicast'.
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
How many maximum paths you can give on latest ios in rip?
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connnection-less oriented D.) Incorporates no handshaking
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy