Networking Protocols (671)
Networking Administration (1008)
Networking Security (196)
Networking General (266)
Networking AllOther (430) You have a class C subnet. You would like divide it up into subnets by "subnetting". You have to have at least 24 nodes per subnet. How many subnets can you have ? a. 2 b. 6 c. 7 d. 8 e. 14
1 2900Your class C network has been subnet-ed. Mask for the new subnets is 255.255.255.248. How many subnets and how many nodes per subnet can you have ? a. 30, 6 b. 30, 7 c. 62, 2 d. 62, 6 e. 62, 7
1 2687Your previous Network Administrator had subnneted your Class C network into many subnets. Only info you have is that the mask was 255.255.255.224 How many subnets did he make ? How many nodes were there per subnet ? a. 2, 62 b. 7, 30 c. 6, 30 d. 6, 62 e. 7, 62
1 2480You have a class B subnet. You would like divide it up into 5 more subnets by "subnetting". However you also have to have at least 6000 hosts per subnet. Can you do it ? a. Yes b. No.
1 2620Class E IP address range and its use ? a. 240-255, experimental b. 224-239, multicast c. 224-255, multicast d. 192-255, experimental
1 3834How long is MAC address (bytes) ? How may bytes identifies the vendor? a. 8,2 b. 6,3 c. 8,4 d. 6,2
1 2733What is a "preamble" in IEEE 802.3 frame? a. an indication of the end of a frame b. an indication of the start of a new frame c. an indication of congestion d. an indication of a corrupted frame
1 2843ICMP redirects are sent from _ to __ ? a. DTE, DCE b. DCE, CTE c. host, router d. router, host
1 3014What protocol is used to convert IP addresses to MAC addresses ? a. IP b. ARP c. RARP d. InARP e. appletalk
1 3429What is flow control ? a. To keep the transmitting device from transmitting no faster than the receiving device can receive. b. To find the best route to a destination c. To determine which machine transmits packets on the wire on a given instance. d. To be able to send a beacon message when congestion occurs.
1 2633Your previous Network Administrator had subnetted your network into many subnets. Only info you have is that one of the hosts IP was 200.252.144.33 and the mask was 255.255.255.240. Which class network is it ? How many bits are being subnetted ? What is the broadcast address ? a. B, 28, 255.255.255.47 b. C, 20, 255.255.255.47 c. C, 28, 255.255.255.47 c. C, 28, 255.255.255.32
1 2735Default subnet mask for Class A, B, and C ? a. 0.255.255.255, 0.0.255.255, 0.0.0.255 b. 255.0.0.0 , 255.255.0.0, 255.255.255.0 c. 255.255.255.0, 255.255.0.0, 255.0.0.0 d. 0.0.0.0, 0.0.0.255, 0.0.255.255
1 2763You have a class B network 172.16.0.0. You use a 11 bits for subnetting. Which of the following is a correct range of Ip addresses that belong to the same network. a. 255.255.8.1 to 255.255.14.254 b. 255.255.255.9 to 255.255.255.14 c. 255.255.17.1 to 255.255.22.254 d. 255.255.17.0 to 255.255.22.255
1 3310
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
Explain leaky bucket algorithm and compare it with token bucket algorithm.
What is one advantage of mesh topology?
What is ipconfig renew?
What is ipconfig?
What are the generally asked questions for a Person who is attending Network protocol testing L2/L3.
What port number is 8080?
Why TCP/IP reference model is more popular than OSI model ?
Explain VLAN concepts
what is the maximum segment length of a 100base-fx network?
Can the IP address be same for 2 PC's?
Discuss how satellite network differs from traditional networks such as Ethernet, Tokenbus.
Does ip address change with wifi?
How can you manage a network using a router?
Does netstat show hackers?