Lear for life
DB-9
RJ-45
T-Connection
DB-25
The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them.
The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack
The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML. ASN.1 has a set of cryptographic encoding rules that allows end-to-end encryption between application entities.
Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.
Segment
Backbone
Subnet
Peer Node
Dynamic Routing
Switch Routing
Bridge Routing
Static Routing
256
254
255
162
Auditing
Authentication
Access control
Securing server
Auditing
Securing Server
Access server
Authentication
Parameter Problem
Time Exceeded
Destination Unreachable
Source Quench
Parmeter problem
Time Exceeded
Destination unreachable
Source Quench
2--1--3--4
1--2--4--3
2--4--3--1
1--2--3--4
2-- >1 -- >4-- >3
2-- >3 -- >4-- >1
1-- >2-- >3-- >4
2-- >4-- >1-- >3
The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into IP addresses.
The Domain Name System (DNS) is a TCP/IP name resolution service that translates MAC address into IP addresses.
DNS is a network service that provide automatic assignment of IP addresses and other TCP/IP configuration information on network nodes.
The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into MAC addresses.
Cat 1
Cat 5
Cat 6
Cat 5e
DB-9
RJ-45
DB-25
T-connectors
Category 3
Category 1
Category 5
Category 5e
Both, statements A and statements B are TRUE
Statement A is FALSE and statement B is TRUE
Statement A is TRUE and statement B is FALSE
Both, statements A and statements B are FALSE
Border Gateway Protocol
Routing Information Protocol
Internet Group Massage Protocol
Open Shortest Path First
Server and work station
Maintenance utilities
Backup documentations
Productivity and application software
Extranet VPN
Intranet VPN
Internet VPN
Remote Access VPA
Man-in-the-middle
Sniffing
Denial-of-service
Spoofing
2--3--1--4
2--4--1--3
2--1--4--3
1--2--3--4
3--2-4--1
A cluster in which nodes shares common hardware resources such as processors, memory, and disks
Latency time is minimum in this clustering scheme in case of failover
A cluster that has all nodes online, constantly providing services
A cluster that at least one node in active mode while at least one node acts as backup node
Full simplex
Full duplex
Half duplex
Simplex
An organization dedicated to advancing theory and technology in the electrical sciences.
An organization that develops and maintains Internet standards and contribute to the evolution and smooth operation of the Internet
An American institute that facilitates that formation of a variety of national standards, as well as promoting those standards internationally
An organization that develops and issues standards for telecommunications and electronics
Integrated support for window, and Unix clients in workgroup and clients
Integrated E-mail service
DNS, DHCP, NAT and firewall services
Mac OS X supports three type of Accounts e.g. Administrator, Standard User, Guest User
1->2->4->3
2->3->4->1
2->1->3->4
2->4->3->1
10GBaseSR
100Basetx
100Baset
10Base2
Synchronous Optical NETwork
T-carrier systems
E-carrier systems
Synchronous Digital Hierarchy
Computer System
Autonomous System
Docking System
Dependent System
Both, statements A and statements B are TRUE
Statement A is FALSE and statement B is TRUE
Both, statements A and statements B are FALSE
Statement A is TRUE and statement B is FALSE
In both Microwave and Radio Transmission
Radio Transmission
Infrared Transmission
Microwave Transmission
Use Netstat to check the statistics to see if connection is good by examine no of bytes in the sand and receive queue
Using Ping command between various source and destination to find out a routing loop or the point at which route falls
Use Tracert command to trace the route of packets between various source and destination to find out a routing loop or the point at which route fails
Use Nslookup to verify the DNS server configuration and examine weather server is responding to request.
Tracert
Netstat
Nslookup
A segment
A node
A redistribution point
An endpoint
255.255.192.0
255.255.256.0
255.255.255.240
255.255.224.0
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
If the packet is addressed to a node on its own segment, the bridge does not forward the packet.
Bridge examine the MAC address of each packet before deciding to forwarding/or not forwarding it.
In bridge this is no need to configure the subnet addresses associated with each port.
A bridge is a networking device used to connect the drops in a physical stat topology.
He should use Wireless Access Point Transceiver
Switch with Radio transmitter
He should use a Bridge point device
He should use a Router and Switch device
It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.
It any type of unauthorized effort to discover a user’s valid password
It is a type of attack. In which a device outside the network uses an internal network address to masquerades as a device inside the network.
It is any type of network or data access that is not explicitly approved by the organization.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.