Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC
2 4978The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
3 15803Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) RPC
2 4564What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
1 4485What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) Annex D B.) Q933A C.) Cisco D.) IETF E.) ARPA F.) Anex A
2 5485Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
1 4371Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network
2 5734Which type of switching reads in the entire frame before forwarding it? A.) Pause-and -forward B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing
2 5134Which OSI Reference Layer is concerned with path determination? A.) Datalink B.) Physical C.) Network D.) Transport E.) Session
2 9233Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP
2 7610What is the standard ISDN term for a non-native analog telephone? A.) TE1 B.) TA C.) LE D.) TE2 E.) ET
DELL,
1 5687Which Distance Vector characteristic can help to speed up convergence? A.) Triggered Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP.
1 4009Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3
2 4900The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
2 5426What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
1 14641
What is the point-to-point protocol in ccna?
What does the meaning of
sir/mam , i have already appeared the ncfm beginners module. now im going to appear the dealers mod of capital market. my ncfm id is 00000873523. plz send me a mail dat how i wil get my hall ticket. my exam will be on 14.10.2011
CMMI certification procedures
Tell me how many hop counts are by default and how much you can increase in eigrp protocol?
Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.
When does network congestion occur?
1. your user want to display the records of the passenger traveling in the train.He can Sort the list either by the train no or by the date of journey how will the list will be displayed in the Control Level Processing in the Extract Dataset. a) The user has to create two separate internal table and sort accordingly and Two Control level Processing Blocks. b) The User has to create one internal Table with different header line and one processing Block. c) The User has to Define one internal Table and define Two control Level Processing Blocks. d) The User has to sort the internal Table Accordigly and create one Control lvel Processing Block. 2. Secondary Index will help in a) fetching the Data faster. b) Storing the of Data. 3.What does the Field statement Does. a) Delay the transport b) Go to the PAI block of the screen c) Make the Field inactive. 15. LDB NODES. a) 00 01 02 21 Get node 02 What will happen? 16. Second Question Regarding the same Context but asked about the Get Node 00 Get node 21 What will happen.? 17. Questions : - Logical Database (LDB) : a) Authorization is performed. At the LDB b)we do not have to explicit write any program to fetch the data. c)put data is used to update the Databse.
Briefly explain the conversion steps in data encapsulation.
Explain the matric of eigrp protocol?
Domain Trust In Red Hat Linux Dear Friends, I have one doubt, If i have 2 Red hat Linux Server am using 2 domain namely RED & ROSE, and I have 20 or more than 20 XP machine in client, it’s all running by the samba users in RED Domain, the client systems (XP machines) are work both RED & ROSE Domain means , like Domain trust concept, how to configure the Server Main Domain is RED, if it’s go down means it will be working by ROSE Domain can you please give the instruction for this query.
Mention what BOOTP is?
Why we use filter option?
Which is best among dotnet and dotnet diploma? Friends Please answer this question as soon as possible.
What are the conversion steps of data encapsulation?