Computer Networking An example of digital, rather than analog, communication is DDT WATS DDD None of these DDS DDT WATS DDD None of these DDS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. ICMP guarantees datagram delivery.2. ICMP can provide hosts with information about network problems.3. ICMP is encapsulated within IP datagrams.4. ICMP is encapsulated within UDP datagrams. 2 and 3 1 only 1 and 4 All of these 2 and 3 1 only 1 and 4 All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice? CSMA/CD Token-Ring Ethernet ARCnet CSMA/CA CSMA/CD Token-Ring Ethernet ARCnet CSMA/CA ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2 and 4 2, 3 and 5 4 and 5 1 and 3 2 and 4 2, 3 and 5 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP