Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The rules used to define the objects that can be accessed via a network management protocol is called ?



The rules used to define the objects that can be accessed via a network management protocol is calle..

Answer / indu

Structure of Management Information (SMI)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Administration Interview Questions

What is "keepalive"? a. A keepalive is a small, layer-1 bit message that is transmitted by a network device to let directly-connected network devices know of its presence. b. A keepalive is a small, layer-2 message that is transmitted by a network device to let directly-connected network devices know of its presence. c. A keepalive is a small, layer-2 message that is transmitted by a network device to let it neighbors know of congestion d. A keepalive is a small, layer-3 message that is transmitted by a network device to let directly-connected network devices know of its presence. e. A keepalive is a small, layer-3 message that is transmitted by a network device to let it neighbors know of congestion

1 Answers  


Which of the following methods are used as flow control ? Choose 3 a. Acknowledgements b. Windowing c. Traceroute d. TTL e. Sliding windows

1 Answers  


what is different between instalation and configuration?

12 Answers   DELL, HCL,


Which agents are responsible for putting messages in inbox of the recipient.

1 Answers  


how many machines can access together SQL server in workgroup networking.??

2 Answers  


what is MBR and how will u clear this ?

2 Answers  


Which RFC defines the SMI ?

1 Answers  


Which option of the snoop command tells it to display from a host ?

1 Answers  


You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size

1 Answers  


Which command causes name daemon to return to level 0 (debug) ?

1 Answers  


What is tunnel mode?

0 Answers  


True or False: All network cards are 16 bit.

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)