What allows a network to be assigned more than one netmask.
What is spoofing? a. Where a packets claims its source to be other that what its source really is. b. Same as "denial of service" attacks c. Where a machine continually pings another machine d. Where certain broadcasts are passed through a router
What is a MAC ? a. It is the network layer address of a NIC that can not be modified b. It is the network layer address of a NIC that can be modified c. It is the Data Link Layer address of a NIC that can not be modified d. It is the Data Link Layer address of a NIC that can be modified
How many layers are under tcp/ip?
how many scopes con create in one dhcp?
You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size
what is the benefit of sql server ?
what is dhcp? what is the uses and advantages?
On what layer does SMB protocol reside? a. application b. presentation c. session d. transport
What does the MAC sublayer of the Data Link Layer do ? (choose all that apply) a. builds frames b. checks to see that nothing got damaged in transit by CRC c. determines "which machine goes first on the wire" d. provides path to the destination host e. Gets data on and off the wire
Which protocol in Solaris machines makes distributed file systems possible ?
The last octet of the broadcast address of a Class C network is :
Which protocol is working behind DHCP server? and what excatly DORA does?