logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?


  • Options
  • A. Layer 7 protocols
  • B. Layer 6 protocols
  • C. Layer 5 protocols
  • D. Layer 4 protocols
  • E. None of the above

  • Correct Answer
  • Layer 7 protocols 


  • Networking problems


    Search Results


    • 1. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

    • Options
    • A. 192
    • B. 224
    • C. 240
    • D. 248
    • E. 252
    • Discuss
    • 2. Which of the following refers to the terms "residual error rate"?

    • Options
    • A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line
    • B. The probability that one or more errors will be undetected when an error detection scheme is used
    • C. the probability that one or more errors will be detected when an error detection mechanism is used
    • D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz
    • E. None of the above
    • Discuss
    • 3. Which address is the loopback address?

    • Options
    • A. 0.0.0.1
    • B. 127.0.0.0
    • C. 127.0.0.1
    • D. 255.255.255.255
    • E. None of the above
    • Discuss
    • 4. Modulation is the process of

    • Options
    • A. converting analog signals to digital signals
    • B. converting digital signals to analog signals
    • C. Multiplexing various signals into high speed line signals
    • D. performing data encryption.
    • Discuss
    • 5. Sending a file from your personal computer's primary memory or disk to another computer is called

    • Options
    • A. uploading
    • B. downloading
    • C. logging on
    • D. hang on
    • E. None of the above
    • Discuss
    • 6. To connect a computer with a device in the same room, you might be likely to use

    • Options
    • A. a coaxial cable
    • B. a dedicated line
    • C. a ground station
    • D. All of the above
    • Discuss
    • 7. Which of the following best illustrates the default subnet mask for a class A,B, and C Network?

    • Options
    • A. 0.0.0.0, 0.0.0.1, 0.0.1.1
    • B. 255.255.255.0, 255.255.0.0, 255.0.0.0
    • C. 255.0.0.0, 255.255.0.0, 255.255.255.0
    • D. 255.255.0.0, 255.255.255.0, 255.255.255.255
    • E. None of the above
    • Discuss
    • 8. HOSTS file entries are limited to how many characters?

    • Options
    • A. 8
    • B. 255
    • C. 500
    • D. Unlimited
    • E. None of the above
    • Discuss
    • 9. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

    • Options
    • A. 255.255.252.0
    • B. 225.255.254.0
    • C. 255.255.255.240
    • D. 255.255.255.252
    • Discuss
    • 10. The first step in troubleshooting many problems is to verify which of the following?

    • Options
    • A. The subnet mask is valid
    • B. TCP/IP is installed correctly on the client
    • C. The WINS server is running
    • D. The BDC is operable
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment