Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of





You can do it
  1. Which of the following is required to communicate between two computers?
  2. The worldwide Internet is a well-known example of ------------------.
  3. A modem is a card within a PC that converts the ... the computer produces to .. that can pass over telephone…
  4. FDDI operates on 100 Mbps.
  5. The general form of the SMTP destination address is ________________.
  6. Which of the following IP addresses are used by multicast devices?
  7. Your Web server is also configured as an FTP server. What part of the data packet will tell the server…
  8. In 1996, 36.44% of _________ addresses were brought in use.
  9. _______ body looks after the protocol identifiers used over Internet.
  10. Which of the following connectors is used by UTP on a Fast Ethernet network?
  11. UDP datagram has a header, which is of ________.
  12. Which of the following algorithms are meant for establishing the paths through the network?
  13. What is the maximum distance of single-mode fiber (SMF)?
  14. What is the address identified when socket is available at each end of TCP?
  15. What is the maximum length of thinnet cable before a signal booster is needed?
  16. ________is a multicast extension to OSPF Version 2.
  17. What is the maximum frame size of a frame relay?
  18. Data Transmission is not a layer in the OSI model
  19. Which of the following headers does a router look at to find how to route a data packet?
  20. What is the pattern of a preamble?
  21. Which of the following protocols are considered unreliable or connectionless?
  22. Where are routing tables placed?
  23. In FTP, to execute a file transfer, the user begins by _________.
  24. What are the subnet mask in dotted decimal notation for /20 networks?
  25. OSPF is based on
  26. At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
  27. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  28. A node, which is more powerful, and can handle local information processing or graphics processing is…
  29. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  30. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…