You are on page 1of 6

Configure two DHCP Servers

How to configure two DHCP Servers using 2 swithces with 1 DSL. Keep in mind
we cannot use any other additional equipment. 
View Question | Asked by : imz.ez

Answer Question     Subscribe 

Connect and Configure

There are four routhers and 4 swiches and 40 computers in an office. How will
you connect each devices and configure those devices? 
Latest Answer: This is using different network build purpose, so connect first
router to  first switch and connect 10 nodes with first switch, this is one
network ex:192.168.1.0 networkand connect second router to second switch
with 10 nodes this is another network ex:192.168.2.0 ...
Read Answers (2) | Asked by : ahmed12

Answer Question     Subscribe 

Read a Switch

You are given only the IP address of the switch but not the port number. How
will you read that switch? 
Latest Answer: If the switch has an Ip address, you telnet to the switch and
provided that there is no password set either at virtual terminals or to enter
the privileged mode, you can enter privileged mode and write sh run and read
the running config. ...
Read Answers (2) | Asked by : ahmed12

Answer Question     Subscribe 

Network Negotiation

What does negotiation mean when discussing network protocols?  


Latest Answer: The Difference Between Half and Full Duplex."Duplex" simply
means you're able to send and receive data (most often the human voice) from
the same device whether that be with your phone, 2-way radio, or PC.Half-
duplex devices let you send and ...
Read Answers (2) | Asked by : binalharia

Answer Question     Subscribe 

Communicating

When two network layers are in communication with one another, these layers
are known as?a.)PDUsb.)peer entiiesc.)PRAMsd.)sockets  
Latest Answer: b.) Peer Entities ...
Read Answers (2) | Asked by : chicago57

Answer Question     Subscribe 

WAP Gateway

What is the function of a WAP gateway ? Discuss WAP protocols. 


Latest Answer: Implementation of the WAP stack Converting protocols Converting
markup languages Compiling WMLScript programs Encoding WML into a binary
bitstream Providing access control Caching Domain name resolution services
(DNS) Security features ...
Read Answers (1) | Asked by : anuj023

Answer Question     Subscribe 

Data Transmission From Server to Server

State the technical steps required for data transmission from server to server
via a router and switch 
View Question | Asked by : baby mi

Answer Question     Subscribe 
Token Ring Segment

You need to connect a Token Ring segment to an Ethernet segment. Would you
use a router, a brouter , or a bridge ? 
Latest Answer: Router is needed with two interfaces: one Token Ring, another
Ethernet one. ...
Read Answers (1) | Asked by : Metro2007

Answer Question     Subscribe 

TCP IP Integration

TCP is reliable in communication whereas IP is Non-reliable. Why it is


integrated into one and given as TCP/IP protocol? 
Latest Answer: Reliability not achieved at lower layers shall be implemented at
the higher layers and more importantly each Layer in TCP/IP protocol suite is
responsible for some network operations. IP though unreliable it implements
routing of network information ...
Read Answers (1) | Asked by : sujiks

Answer Question     Subscribe 

Cable Length

Why do we have a minimum and maximum cable length requirement 


Latest Answer: The min and max cable length is required because the signals can
travel effectively without loosing their strength to that extent you can increase
the cable length apart from preferred by using the repeaters after the length
so that the signals will be ...
Read Answers (1) | Asked by : f150stang

Answer Question     Subscribe 
ISP Protocol
Which protocol is used to communicate between client and ISP? 
Latest Answer: OSPF is used. Because it is considered to be the most efficient
IGP(interior gateway protocol). BGP is more widely used as exterior gateway
protocol(EGP). ...
Read Answers (2) | Asked by : AW Networks

Answer Question     Subscribe 

Install Printer in Network Environment

You have been given 1 printer and 1 IP Address for installing it in a Networking
EnvironmentHow will you do it? 
Latest Answer: Go to the start menu - setting - printers and fax - add a printer -
local printer attached to this pc - create the new port - select the standard
tcp/ip protocol - and enter the ip address and insert the printer CD for driver
and install the printer ...
Read Answers (3) | Asked by : shamz.ek

Answer Question     Subscribe 

Missing NTLDR File

Windows crashed because NTLDR File is missing. How will you restore this file
(Without using Safe Mode Option)? 
Latest Answer: Step 1Locate your windows xp/2000 install disk and place it in
your CD/DVD ROM drive. If you do not have this disk then you cannot proceed
any further.Step 2Restart your computer or turn it off then back on again.Step
3When the computer restarts press ...
Read Answers (7) | Asked by : shamz.ek

Answer Question     Subscribe 
IP V6 PING

How do you ping from one host to another in IPv6 without ARP?  
Latest Answer: By using the Neighbour Discovery Protocol (NDP) ...
Read Answers (2) | Asked by : kcrao

Answer Question     Subscribe 

Default Subnet Mask for IPV6

What is the default subnet mask for IPV6? 


Latest Answer: There are 3 address types in v6 - Unicast, anycast, and multicast.
Unicast addresses identify a single network device, anycast and multicast
addresses identify a group of network devices. IPv6 addresses are 128 bit,
compared to the 32 bit addresses of ...
Read Answers (1) | Asked by : mangala2910

Answer Question     Subscribe 

Ping Death Packet

What is ping to death packet?What is the size of ping to death packet?/ 


Latest Answer: POD (Ping of Death) is a type of attack at computer in a network
that involves sending of a larger size malicious ping to a computer. A ping is
normally 64 bytes in size.Many computers can not handle larger than the
maximum ip packet size, which is 65,535bytes. ...
Read Answers (1) | Asked by : suchitra425777

Answer Question     Subscribe 

VLAN and INTERVLAN

What is VLAN and INTERVLAN? Why do we use these techniques?What are the
differences between STP, RSTP and MSTP? 
Latest Answer: VLAN are used to segment your network eliminate broadcast it is
also used for security purpose.VLAN of sales department cannot access VLAN of
finance department.InterVLANs are used to create VLAN to VLANs. ...
Read Answers (2) | Asked by : callnitin

Answer Question     Subscribe 

Explain about Scan Disk ? How scan disk fixes errors ?

Latest Answer: It is a tool used to check and repair disk related errors like,1. Bad
Sector2. Partition Table3. Cross Link File4. Currup File    etc. ...
Read Answers (2) | Asked by : ranjithkolaboina

Answer Question     Subscribe 

Access a File on Another Computer

A person would like to access a file on another computer (connected via LAN)
while working with safe mode. What should he do? 
Latest Answer: In safemode itself he can use telnet to access file on the other
system in the same LAN ...
Read Answers (2) | Asked by : rrsain

Answer Question     Subscribe 

Printer Driver Replication

What is Printer driver replication and mapping? 


View Question | Asked by : sk_naresh

Answer Question     Subscribe 

You might also like