What is the distance limitation for 100BaseT?
A. 607 ft
B. 25 Meters
C. 1,000 ft
D. 185 Meters
What is the mau?
What command do you enter at the keyboard to begin a user mode session? A.) Type 'CTRL-P' B.) Type 'login' C.) Just press . D.) Type 'enable' E.) Press 'Shift + Ctrl + 6' at the same time.
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
What is subnetting? Why is it used?
I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem
Which type of LAN segmentation device enables high speed data exchange? A. hub B. bridge C. switch D. repeater
What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless
What does the Frame Relay switch use to distinguish between each PVC connection? A. data-link connection identifiers (DLCIs) B. BECNs C. FECNs D. the Local Management Interface (LMI)
Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup
What are the ranges of private ips?
what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com