Identify the keystroke to position the cursor to the
beginning of
a command line?
A.) Ctrl-A
B.) Ctrl-Ins
C.) Ctrl-B
D.) Ctrl-Z
Answers were Sorted based on User's Feedback
Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address
Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward
Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet? A. Class B B. Class A C. Class C D. Class D
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
Can anybody tell me how to configure a cisco router?
There is a process in Frame-Relay where LMI resolves an IP address from a DLCI number. What is this called? A.) arp B.) inverse arp C.) rarp D.) automap E.) reverse arp F.) arp
Name the protocol which can do load balancing on unequal cost also?