The rules used to define the objects that can be accessed via a network management protocol is called ?
What is "keepalive"? a. A keepalive is a small, layer-1 bit message that is transmitted by a network device to let directly-connected network devices know of its presence. b. A keepalive is a small, layer-2 message that is transmitted by a network device to let directly-connected network devices know of its presence. c. A keepalive is a small, layer-2 message that is transmitted by a network device to let it neighbors know of congestion d. A keepalive is a small, layer-3 message that is transmitted by a network device to let directly-connected network devices know of its presence. e. A keepalive is a small, layer-3 message that is transmitted by a network device to let it neighbors know of congestion
Which of the following methods are used as flow control ? Choose 3 a. Acknowledgements b. Windowing c. Traceroute d. TTL e. Sliding windows
what is different between instalation and configuration?
Which agents are responsible for putting messages in inbox of the recipient.
how many machines can access together SQL server in workgroup networking.??
what is MBR and how will u clear this ?
Which RFC defines the SMI ?
Which option of the snoop command tells it to display from a host ?
You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size
Which command causes name daemon to return to level 0 (debug) ?
What is tunnel mode?
True or False: All network cards are 16 bit.