What does the User Datagram Protocol (UDP) provide?
A.) Connectionless datagram service.
B.) FECN & BECN
C.) Flow control and error checking.
D.) Name resolution.
E.) Path discovery.
Answer / guest
Answer: A
UDP is connectionless, and does not provide error checking. But
remember, error checking can occur at other layers too.
| Is This Answer Correct ? | 4 Yes | 0 No |
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
At which layer of the OSI Reference Model do bridges operate? A.) Physcial B.) Session C.) Datalink D.) Transport E.) Network
Can you define in short what VPN is?
What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.
Which of the following is an example of a Transport Layer protocol? Ethernet IP TCP RS-232
Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Which protocol will send a message to routers if a network outage or congestion occurs? A.) ARP B.) TCP C.) IP D.) ICMP
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
1 whatis te1,te2 and nt1 what is threre functions 2 what are the isdn protocols 3 whait is spid