Which application protocol can not be blocked by the Switch?
No Answer is Posted For this Question
Be the First to Post Answer
You have divided your class C network into 6 subnets. Your subnet mask is 255.255.255.224. What are the ranges of IPs for your subnets ? Your Network address before subnetting was 200.252.144.0 a. 32-62, 64-93, 96-125, 128-157, 160-189, 192-221 b. 33-63, 65-94, 97-126, 129-158, 161-190, 193-222 c. 34-64, 66-95, 98-127, 130-159, 162-191, 194-223 d. 35-65, 67-96, 99-128, 131-160, 163-192, 195-224
Which wrap is used for insulation on STP.
Your previous Network Administrator had subnneted your class C network into many subnets. Only info you have is that one of the IP range was 200.252.144.33 through 128.252.144.46. How many subnets did he make ? what was the mask ?
UDP runs its own ? a. data-link layer protocols b. CRC c. routing d. Acknowledgements
VLAN tagging/un-tagging process –where and when it happens?
True/False: DNS gives you the ability to restrict queries from machines in a particular zone.
List the advantage of address sharing?
Solaris machines more often than not runs routed daemon. routed is the unix equivalent of RIP. It is always run with -q option. Why ? a. q options optimizes the process b. q option uses a default route c. q option only activates itself in the absence of a default router d. q option tells the process not to advertise any routes. It just listens to the RIP udates. That way it does not interfere with router in the subnet.
2 examples of a packet-switched network. a. public telephone network b. ethernet network c. token-ring network d. ATM network
A machine that is not a mail host, relay host, or gateway would use which file ?
What does SNMP use to send unsolicited messages to the managing host ?
What will the command "dfshares" will do without any arguments?