Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) Which layer is responsible for identifying and establishing the availability of the intended communication partner? * Application * Presentation * Transport * Session * Network
5 15924Choose three reasons why the networking industry uses a layered model: * It facilitates systematic troubleshooting * It allows changes in one layer to occur without changing other layers * It allows changes to occur in all layers when changing one protocol * It clarifies how to do it rather than what general function to be done * It clarifies what general function is to be done rather than how to do it
2 13199Which two of the following protocols are used at the Transport layer? * ARP * UDP * ICMP * RARP * TCP * BootP
16 22148What?s the default CDP holdtime in seconds for Cisco routers? * 30 seconds * 180 seconds * 90 seconds * 60 seconds
15 29625Which of the following are logged when IP access list logging is enabled? * source address * protocol * source port * destination address * access list number * destination port
3 8543Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? * Session * Network * Physical * Transport * Application * Presentation
5 11371Which of the following provide correct information about a protocol at the transport layer of the OSI model? * UDP - Provides Connectionless datagrams service * TCP - Provides Connection Oriented Services * SMTP - Provides Mail Exchange * IP - Route determination * TCP - Provides Flow Control and Error Checking * FTP - Transfers of Files
8 13255Describe End to End network services: (Choose all that apply) * Best Route selection * Accomplished Segment by Segment, each segment is autonomous * Flow Control & Data Integrity * Best efforts packet delivery
8 11603What are the 2 functions of the Data Link Mac layer? * Handles access to shared media * Manages protocol access to the physical network medium * Provides SAPs for higher level protocols * Allows multiple devices to uniquely identify one another on the data link layer
8 19909Which layer is responsible for determining if sufficient resources for the intended communication exists? * Application * Network * Session * Presentation * Transport
13 22764A software is installed in server.How to share the software among the clients
Accenture, Goyal Group, HP, Wipro,
12 21448
Explain Various fields in Ethernet frame format
Explain the network architecture?
How do I unblock a port?
What is osi and what role does it play in computer networks?
How does FDDI node determine whether it can send asynchronous traffic and synchronous traffic
What is the full form of ping?
What is the last major networking problem you troubleshot and solved on your own in the last year?
Do I use tcp or udp?
What is a ddos attack?
What is T1 and E1? How many D and B channels do they have in case of ISDN?
What is the advantage of address sharing?
whenever install patch cluster, system will be restart what is the problem?
What factors would you consider before deploying a web intrusion detection system?
What is attenuation
Do you know what is the purpose of cables being shielded and having twisted pairs?