Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 3 Layer 7 Layer 2 Layer 4 Layer 3 Layer 7 Layer 2 Layer 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? 240 248 224 252 192 240 248 224 252 192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets the secret password to Cisco? enable secret Cisco enable password Cisco enable secret cisco enable secret password Cisco enable secret Cisco enable password Cisco enable secret cisco enable secret password Cisco ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 only 1, 3 and 4 3 and 4 1 only 3 only 1, 3 and 4 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries? data link layer transport layer physical layer None of these network layer data link layer transport layer physical layer None of these network layer ANSWER DOWNLOAD EXAMIANS APP