In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?

A. Non-authenticated state

B. Authenticated state

C. Selected state

D. Logout state

You can do it
  1. DSL stands for ------------------------
  2. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  3. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  4. Which of the following connectors is used by UTP on a Fast Ethernet network?
  5. How many layers are there in the OSI model?
  6. The key concern in the design of transmission system is -------------- and ---------------
  7. ARP is defined in RFC _____ and it is a current internet standard, ________
  8. ADSL uses high-speed Internet service phone lines
  9. How many 64-Kbps channels are used on an ISDN BRI?
  10. Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of servers?
  11. A time exceeded message is generated if .
  12. Select the standard for token ring using token-passing media access.
  13. What is the distance limitation of Cat5 UTP?
  14. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  15. Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?
  16. In an autonomous system with n areas, how many areas are connected to the backbone?
  17. Which of the following provides the service for any casting?
  18. Which of the following is defined in RFC 4366?
  19. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection…
  20. FTP servers by default listen on port ________ for incoming connections from FTP clients.
  21. You have a network card with the connector in question 43, and it also has a 15 pin female connector,…
  22. Where are routing tables placed?
  23. Which class does the IP address belong to?
  24. Internet e-mail system based on the ..
  25. Which of these is an example for unguided transmission?
  26. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line…
  27. Pure ALOHA has a maximum throughput of -----------
  28. Which of the following are not the standard representations defined by Telnet protocol?
  29. Which of the following can be used to transfer files from a Unix server?
  30. In an active mode if any FTP client sends the port command "PORT 192,168,0,1,4,1" then what will be…