Computer Networking A medium access control technique for multiple access transmission media is Attenuation Angle modulation Aloha None of these Amplitude Attenuation Angle modulation Aloha None of these Amplitude ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1, 3 and 4 1 only 3 and 4 3 only 1, 3 and 4 1 only 3 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.248 255.255.255.224 255.255.255.192 255.255.255.255 255.255.255.240 255.255.255.248 255.255.255.224 255.255.255.192 255.255.255.255 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A data communications system has: 6 components 4 components 7 components 5 components 6 components 4 components 7 components 5 components ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet 1 and 4 1, 2 and 3 3, 4, and 5 All of these 1 and 4 1, 2 and 3 3, 4, and 5 All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How much power (roughly) a light-emitting diode can couple into an optical fiber? 100 microwatts 10 milliwatts 440 microwatts None of these 100 picowatts 100 microwatts 10 milliwatts 440 microwatts None of these 100 picowatts ANSWER DOWNLOAD EXAMIANS APP