Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error detecting code Cyclic redundancy check Checksum Error rate None of these Error detecting code Cyclic redundancy check Checksum Error rate None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands connect access list 110 inbound to interface ethernet0? Router(config)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-group 110 in Router(config-if)# ip access-list 110 in Router(config)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-group 110 in Router(config-if)# ip access-list 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? None of these Fax Keyboard Scanner Modem None of these Fax Keyboard Scanner Modem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will delete the contents of NVRAM on a router? erase start delete NVRAM erase NVRAM delete startup-config erase start delete NVRAM erase NVRAM delete startup-config ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? 224 240 248 192 252 224 240 248 192 252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? SMTP RPC FTP SNMP None of these SMTP RPC FTP SNMP None of these ANSWER DOWNLOAD EXAMIANS APP