Which RFC defines the SMI ?
Define proxy servers and how do they protect computer networks?
Windowing happens at which layer ? a. network b. transport c. session d. presentation
Name 3 problems with distance-vector protocol ? a. not feasible for small internetwork b. count-to-infinite c. routing loops d. inconsistent views of network
How long does an entry stay in the arp table by default ?
What is a runt, Giant, and collision?
List 4 conditions that can be specified in the nsswitch.conf file?
what is definition of shadow copy
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
A subnet's mask is 255.255.255.192. How many nodes can this subnet have?
True/False: 802.2 can identify upper layer protocols:
Explain how dynamic host configuration protocol aid in network administration?
What is firewalls?