Computer Networking An example of a medium-speed, switched communications service is All of these Series 1000 Dataphone 50 None of these DDD All of these Series 1000 Dataphone 50 None of these DDD ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent switching loops in networks with redundant switched paths To create collision domains To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To prevent switching loops in networks with redundant switched paths To create collision domains To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What frequency range is used for microwave communications, satellite and radar? Low Frequency : 30 kHz to 300 kHz Extremely High Frequency :30,000 MHz None of these Medium Frequency : 300 kHz to 3 MHz Super High Frequency : 3000 MHz to 30000 MHz Low Frequency : 30 kHz to 300 kHz Extremely High Frequency :30,000 MHz None of these Medium Frequency : 300 kHz to 3 MHz Super High Frequency : 3000 MHz to 30000 MHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you use either Telnet or FTP, which is the highest layer you are using to transmit data? Presentation Application Transport Session Presentation Application Transport Session ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error control is needed at the transport layer because of potential errors occurring _____. from transmission line noise in routers from packet losses. from out-of-sequence delivery from transmission line noise in routers from packet losses. from out-of-sequence delivery ANSWER DOWNLOAD EXAMIANS APP