what are the different asymmetric algorithms?
No Answer is Posted For this Question
Be the First to Post Answer
How do you depict an IP address?
What is the size of IP address?
(1)what is "rtp" and how it work, (2)what is diffrence between igrp and eigrp (3)the slection prcedure of dr and bdr is depend open (4)why frame really is called nbma (5)what is ppp (6) what is diffrence b/w tcp and udp (7) how can we implement ospf protocall on any router (8)whta is as nomber (9)what is AD value (10)what is the broadcast id,n/w id and number of vallid host of the 255.255.255.128/25 195.168.10.10/25 (11) what is stub network (12) what is contigues n/w (13)on which type of router we can implement default routing (14)what is diffrence b/w hub switch;switch router, (15)what is v lan (16)what is the diffrence b/w link sate protocal and distance vector protocall (17)what is synchoransh mode of data transfer and asynchronash mode of data transfer (18) question on lab, belive me frnds there are 20 questions and 5 questions on lab implimentaion.around 1.1/2 hour i was in interview room and after givieng 17 right answera and 4 in lab i got slected try to give answer if any difficulty or any prob plz email me on jitenderasinha.it@gmail.com if any one of you havae boson netsim plz also intimate me
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? A.) Session B.) Network C.) Physical D.) Transport E.) Application F.) Presentation
How do you configure a cisco router for routing ipx?
Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages C.) Transporting routing updates D.) Collision detection
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data