Home

Which of the following SIP request terminates a call?

A. ACK

B. BYE

C. INVITE

D. CANCEL

You can do it
  1. 127.0.0.1 address is reserved for internal loopback functions.
  2. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  3. What is the length of MARKER field in BGP message header?
  4. _____________ command is used by the client to transfer the job across to the server.
  5. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  6. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line…
  7. Which of the following application uses 1.5 Mbps bandwidth?
  8. Select the standard for token ring using token-passing media access.
  9. AppleTalk protocol configures hosts in zones on the network.
  10. Which of the following states suggests that the connection has been ended either at the request of the…
  11. Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?
  12. Which of the following use default routes for inter domain routing?
  13. Using a class B address maximum of networks can be defined with up to..hosts per networks.
  14. 80 is the well-known port number for the HTTP service.
  15. 25 is used by SMTP
  16. Which class of IP addressing was not brought in much use?
  17. SMTP protocol is responsible for sending email across the Internet
  18. What is the maximum size of IP header in the UDP Datagram format?
  19. The special address 'THIS HOST' is referred to as
  20. What is the maximum length of thick Ethernet cable before a signal booster is needed?
  21. How many 64-Kbps channels are used on an ISDN BRI?
  22. _________ is a type of domain name queries.
  23. FTP servers by default listen on port ________ for incoming connections from FTP clients.
  24. ARP is defined in RFC _____ and it is a current internet standard, ________
  25. Twisted-pair cable uses what type of connector?
  26. DSL stands for ------------------------
  27. Strings enclosed in _______ quotation marks indicate single tokens.
  28. What are the subnet mask in dotted decimal notation for /20 networks?
  29. You have a network card with the connector in question 43, and it also has a 15 pin female connector,…
  30. ________acts as source and destination for IP traffic.