Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) Which layer is responsible coordinating communications b/w segments ? a. physical b. data-link c. network d. session e. application
1 2559Can ATM allocate bandwidth on demand ? a. Yes b. NO c. Only if you are running LANE d. Only if you are running layer 3 switches
1 2781Which frame type use DSAPs and SSAPS to identify the upper layer protocols ? a. 802.1d b. 802.2 c. 802.3 d. 802.3u
1 2675Which of the follwoing are Layer2 protocols ? Choose all that apply. a. HDLC b. IP c. UDP d. SLIP e. PPP
1 2569which layer converts user input into data ? a. application b. presentation c. session d. transport
1 3074Which layer deals converts formats (unix-dos, EBCDIC-ASCII etc.) ? a. session b. presentation c. transport d. application
1 2415Which layer deals with i) file system transfer ii) ii) virtual terminals emulation iii) interprocess communication. a. Application b. Presentation c. Session d. Transport
1 4045Which layer establishes end-to-end connection ? a. network b. transport c. physical d. data-link
1 2962Which set has protocols of ONLY the Network layer ? a. IP, UDP, TCP, RARP, ICMP b. IP, UDP, ARP, RARP, ICMP c. SPX, UDP, GNS, ARP, APPLETALK d. IPX, FTP, ARP, RARP, ICMP
1 2763Port is where upper layer protocols access which layer ? a. data-link b. network c. transport d. session
1 2539
What is rpf in networking?
What is tcp ip in networking?
How can you manage a network using a router?
What is the pdu of "network layer" and "data link layer"?
how to take backup of BIOS ?
What is optical character recognition?
Explain Traffic shaping using token bucket algorithm
Explain the functionality of osi session layer?
How many bits is ip address and port number?
A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?
How to implement PIX firewall security?
What is network topology?
List the advantage of address sharing?
Explain clustering support
What is the importance of authentication?