October 25, 2023Computer-NetworksQuestion 267 Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat? A Data leak […]
October 26, 2023Nielit STA 17-12-2017Question 1 Correct expression for UDP user datagram length is A length of UDP=length of IP – length of IP header B length of UDP=length of […]
October 28, 2023Computer-NetworksQuestion 866 Consider a 50 kbps satellite channel with a 500 milliseconds round trip propagation delay. If the sender wants to transmit 1000 bit frames, how […]
July 25, 2024SubnettingQuestion 5 The address of a class B host is to be split into subnets with a 6 – bit subnet number. What is the maximum […]