Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Packet sniffers involve
B. Passive receiver
B. Passive receiver
See lessThis is a time-sensitive service:
D. Internet telephony
D. Internet telephony
See lessPhysical layer provides:
D. all of the mentioned
D. all of the mentioned
See lessUser datagram protocol is called connectionless because:
A. all UDP packets are treated independently by transport layer
A. all UDP packets are treated independently by transport layer
See lesscan detect burst error of length less than or equal to degree of thepolynomial and detects burst errors that affect odd number of bits.
B. CRC
B. CRC
See lessWhich of the following device is used to connect two systems, especiallyifthe systems use different protocols?
C. gateway
C. gateway
See lessWhich of the following TCP/IP protocol is used for transferringelectronicmail messages from one machine to another?
C. SMTP
C. SMTP
See lessYour company has a LAN in its downtown office and has now set up aLAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.
D. Router
D. Router
See lessWhich of the following is not associated with the session layer?
C. Semantics of the information transmitted
C. Semantics of the information transmitted
See lessWhat is the size of Host bits in Class B of IP address?
C. 16
C. 16
See less