Which port numbers are used by TCP and UDP to set up
sessions with
other hosts?
A.) 1024 and above
B.) 6 and 17 respectively
C.) 1-25
D.) 6-17
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
TCP and UDP use random port number above 1023 for establishing
communications.
| Is This Answer Correct ? | 1 Yes | 0 No |
Your PC has been configured with IP Address 192.168.3.25 and a subnet mask of 255.255.255.0. Which of the following IP Addresses is a valid default gateway address for your PC? 192.168.3.0 255.255.255.0 192.168.3.2 255.255.255.0 192.168.3.25 255.255.255.0 192.168.4.1 255.255.255.255
With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
what is the difference between eigrp and ospf
Which of the following is true? A. The default is to send debug output to the console screen. B. To view debug output from a telnet session, the "terminal monitor" command must be used C. If the "logging buffered" command is used, the debug output would be sent to RAM and can be viewed with the "show log" command D. If the "no console loggin" command were configured, output would besent to a telnet session E. All of the above F. None of the above G. A, B, and C. H. A, C, D, and E.
Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?
Hello Mr.Jitendera Kuamr Sinha, how is every thing going on? Thanks for your reply. Dear Friend if you can Explain it little bit deeper i will be realy thanks full. Wish you all the Best.
Explain how many types of ends in wan?
What is poe (power over ethernet)?
How do i decide if an extended access-list is in or out?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.