What is mac address size of ipv6?
what is internetworking.
How many potions of ip?
What is masking? why is needed?
What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF
Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI C.) RPC and SQL D.) JPEG and PICT
What does a router do with a packet that it does not have a destination network for? A.) Sends it to the Serial port B.) Drops the packet C.) Sends it back out the same interface it received it in D.) Forwards the packet to the next hop
in which way the datas will transfer from one host to another host by using osi layer?
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking