Home

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

You can do it
  1. This mapping of name to IP address is done by .
  2. The Point-to-Point Protocol (PPP) is described in which of the following?
  3. Which of the following SIP request terminates a call?
  4. Which piece of equipment operates at both the data-link and network layers?
  5. You have a network card with the connector in question 43, and it also has a 9 pin female connector.…
  6. Your Web server is also configured as an FTP server. What part of the data packet will tell the server…
  7. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  8. In the IP address 129.2.8.9, what does 129.2 specify?
  9. Which is the port used by HTTPS?
  10. A node, which is more powerful, and can handle local information processing or graphics processing is…
  11. Which of the following is required to communicate between two computers?
  12. Which of the following address supports 254 hosts on each of 2 million networks?
  13. A time exceeded message is generated if .
  14. ..combines characteristics of linear bus and star topologies.
  15. Which layer of the OSI model does a switch operate in?
  16. Transmission medias are classified into two main categories, which are -------------- and --------------------.
  17. Destination physical address in ARP request is a .address.
  18. 80 is the well-known port number for the HTTP service.
  19. ____________ was developed to support aggregation and summarization of routing information.
  20. In an autonomous system with n areas, how many areas are connected to the backbone?
  21. Which of the following provides control over multimedia sessions?
  22. The Hamming Distance for the codes generated using either even or odd parity will be------------------
  23. What is the maximum size of IP header in the UDP Datagram format?
  24. What is the maximum length of thick Ethernet cable before a signal booster is needed?
  25. Internet Research Task Force (IRTF) body looks after ________.
  26. What is used to boost a digital signal?
  27. Data Transmission is not a layer in the OSI model
  28. Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
  29. In 1996, 36.44% of _________ addresses were brought in use.
  30. ADSL uses high-speed Internet service phone lines