|
Question |
Rating |
View Answer |
|
What is the total number of masters and slaves in a piconet? |
|
View Answer |
|
Which method is used for Data transfer? |
|
View Answer |
|
What is the frequency range used for Bluetooth in Japan? |
|
View Answer |
|
What is the strength of the signal transmitted by powerful cell phones? |
|
View Answer |
|
What is RJ-45 and full name of RJ-45?
|
|
View Answer |
|
What is LDAP? Where all can it be used
|
|
View Answer |
|
Difference between TCP and UDP
|
|
View Answer |
|
What is 802.11b, Bluetooth
|
|
View Answer |
|
What types of routing are possible in a wireless network
|
|
View Answer |
|
How does traceroute work
|
|
View Answer |
|
What are the different types of routing possible at layer 3
|
|
View Answer |
|
Explain TCP connection establishment and tear down
|
|
View Answer |
|
What is ICMP, ARP, Multicast, Broadcast
|
|
View Answer |
|
When are packets passed from TCP layer to application layer? What if some IP packets are lost
|
|
View Answer |
|
Describe TCP flow control
|
|
View Answer |
|
Explain DNS, IP address allocation
|
|
View Answer |
|
What is IP Spoofing? What do hackers do with it
|
|
View Answer |
|
What is DOS attack
|
|
View Answer |
|
Explain SSL
|
|
View Answer |
|
How can you keep a TCP connection from tearing down when no data will be sent for a long time?
|
|
View Answer |