Computer Networking A T-switch is used to None of these transmit characters one at a time rearrange the connections between computing equipment control how messages are passed between computers echo every character that is received None of these transmit characters one at a time rearrange the connections between computing equipment control how messages are passed between computers echo every character that is received ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet 3, 4, and 5 1 and 4 All of these 1, 2 and 3 3, 4, and 5 1 and 4 All of these 1, 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224? Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #no ip classful Router (config) #ip unnumbered Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #no ip classful Router (config) #ip unnumbered ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used. 32 Kbps 64 Kbps 500 Kbps 8 Kbps None of these 32 Kbps 64 Kbps 500 Kbps 8 Kbps None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A teleprocessing system may consist of communications systems None of these All of these computer center systems user systems communications systems None of these All of these computer center systems user systems ANSWER DOWNLOAD EXAMIANS APP