Telnet protocol uses ___________ representation for the function Synchronize.





You can do it
  1. Twisted-pair cable uses what type of connector?
  2. Which type of connector is used on 10Base2 networks?
  3. What is the distance limitation of Cat5 UTP?
  4. What is the default port for Telnet?
  5. Which of these is an example for unguided transmission?
  6. .is a technique of conversion between the representation of digital data in user equipment and the corresponding…
  7. In FTP, to execute a file transfer, the user begins by _________.
  8. AppleTalk protocol configures hosts in zones on the network.
  9. Which is the port used by HTTPS?
  10. Select the class C IP address from the following:
  11. Data Transmission is not a layer in the OSI model
  12. Which of the following are not the standard representations defined by Telnet protocol?
  13. Using a class B address maximum of networks can be defined with up to..hosts per networks.
  14. Which of the following is the port used by SMTP?
  15. What is the maximum size of IP header in the UDP Datagram format?
  16. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  17. OSPF is based on
  18. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  19. How many layers are there in the OSI model?
  20. What can be used in the place of DNS to resolve host names to IP addresses?
  21. 80 is the well-known port number for the HTTP service.
  22. ARP is defined in RFC _____ and it is a current internet standard, ________
  23. How many 64-Kbps channels are used on an ISDN BRI?
  24. Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of servers?
  25. To communicate across a TCP/IP network, you must have a DNS server and DNS clients installed.
  26. Which of the following protocols is described in RFC 793?
  27. At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
  28. How many number of host/machine can be attached to a network using a class B address?
  29. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key…
  30. Which is the port used by POP3?