Computer Networking A modem is connected in between a telephone line and a communication adapter serial port network computer None of these communication adapter serial port network computer None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Bulletin board system is a modem capable of accepting commands converts digital signals to analog signals converts analog signals to digital signals None of these is a public access message system is a modem capable of accepting commands converts digital signals to analog signals converts analog signals to digital signals None of these is a public access message system ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The main difference between synchronous and asynchronous transmission is the pulse height is different. the clocking is derived from the data in synchronous transmission the bandwidth required is different the clocking is mixed with the data in asynchronous transmission None of these the pulse height is different. the clocking is derived from the data in synchronous transmission the bandwidth required is different the clocking is mixed with the data in asynchronous transmission None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: spider network ring network hierarchical network data control network None of these spider network ring network hierarchical network data control network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface? 8 32 30 6 8 32 30 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP