The rules used to define the objects that can be accessed via a network management protocol is called ?
1 2583Which layers of the OSI model are managed by a network protocol such as TCP/IP? (check all that apply) a. Transport b. Physical c. Network d. Presentation
1 2876Which set has protocols of ONLY the Network layer ? a. IP, UDP, TCP, RARP, ICMP b. IP, UDP, ARP, RARP, ICMP c. SPX, UDP, GNS, ARP, APPLETALK d. IPX, FTP, ARP, RARP, ICMP
1 2861Network adapter card drivers reside in the which sub-layer of the Data Link layer of the OSI model.
1 2739You have connected a Token Ring Network (4MBit/s) and an Ethernet Network. Copying a 5MB File from Ethernet to Token Ring takes 30 seconds. Copying from Token Ring to Ethernet takes 2 Minutes. Why? a. the Token Ring network is slower b. the packet size is larger with Ethernet than Token Ring. c. the packet size is larger with Token Ring than Ethernet. d. TCP windows size
1 2566You are installing a 100BaseTX FastEthernet network in a 1-story building. The company has 100 of workstations. The rooms have 1 meter raised ceilings. What cable would you use: a. Coax b. Type 5 UTP c. UTP d. STP
1 2483You are setting up a 100 Mbps network in a building, which is pre-wired. After testing you decided that the cabling is category 3 compliant. What do you do? a. Keep existing b. Change to category 5
1 3263All IP addresses are eventually resolved to network interface card addresses. Which of the following is used to map an IP address to a network interface card address? a. WINS b. DHCP c. DNS d. ARP
1 2701When one runs a packet sniffer on a workstation, that workstation's network card goes into which mode . a. interactive b. routing c. promiscuous d. open
1 2866What IP network addresses are set aside for class A (for private use)? a. 1.0.0.0 (mask 255.0.0.0) b. 10.0.0.0 (mask 255.0.0.0) c. 10.0.0.0 (mask 255.255.0.0) d. 100.0.0.0 (mask 255.0.0.0) e. 100.0.0.0 (mask 255.255.0.0)
1 2561Your class C network has been subnet-ed. Mask for the new subnets is 255.255.255.224. How many subnets and how many nodes per subnet can you have ?
1 3083
How MS-Access DB can be accessed over a network, using JDBC API?
Please Check out and Answer the Questions in Networking section. It's argent.
Why can Bluetooth equipment integrate easily in TCP/IP network?
What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP or IP?
How do cryptography-based keys ensure the validity of data transferred across the network?
Does Araxis offer floating (network) licences for Merge?
What types of routing are possible in a wireless network?
What is a traditional Network Library for SQL Servers?
How do you distinguish a DNS problem from a network problem?
What is the advantage of Ring network ? Compare it with ethernet
What is the difference in terms of connectivity between a scale free network and random network?
Describe the differences between backpropagation and radial basis function learning networks?
What is the impact of networking on healthcare?
Please inform me about the openings of networking field at Kolkata.Is there any interview recently?
How to install BDE network ?