VLAN tagging/un-tagging process –where and when it happens?
how do u share printer through FTP(fire transfer protocol)?
How long is MAC address (bytes) ? How may bytes identifies the vendor? a. 8,2 b. 6,3 c. 8,4 d. 6,2
What is star topology?
What are the drawbacks of implementing a ring topology?
Consider the IP address 128.252.144.84. What is the network id and what is the node id ? assume classful networking. a. 0.0.0.0 and 128.252.144.84 b. 128.0.0.0 and 252.144.84 c. 128.252.0.0 and 144.84 d. 128.252.144.0 and 84
How switch learn MAC address? Explain MAC learning in switches.
whenever we give #metastat cmd in svm, it display output "need to maintain" state, what u do?
SLIP = ?
Describe a case where you have used these tools to troubleshoot?
Which alias must exist for a mail system to run properly ?
True/False: DNS gives you the ability to prevent unauthorized transfers.
Rules and procedures used for network communication called as