The following are the steps toward encapsulation. Put them in order:
1. User input 2. data 3. frame 4. segment 5. datagram 6. bits
a. 1-4-2-5-3-6
b. 1-5-4-2-3-6
c. 1-2-3-5-4-6
d. 1-2-4-5-3-6
You have a Class C network. You have subnetted it into 2 subnets. How many hosts per subnet do you have ?
Which file is used to define host-wide aliases ?
Which kind of gateways is expected to exchange RIP information ?
if one server is down, whenever restart the machine we get ok prompt what is the problem?
What is mac addresses?
Difference between layer 2 and layer 3 devices ?
What is the name of the unique identifier encoded in the NIC? a. MAC address b. IP address.
How do you manage a long term demanding stressful work environment?
In improved Distance Vector Protcols, there is a rule that no router will send a routing update via the interface it learnt of the route in the first place. This is called _____________ ?
Difference b/w SCSI AND IDE
Which option of the dhtadm command adds a symbol or macro definition to dhcptab ?
Describe a routing filter and what it does?