Computer Networking Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called? Telemailing Teleconferencing Teletalking None of these Telemeeting Telemailing Teleconferencing Teletalking None of these Telemeeting ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement describes a spanning-tree network that has converged? All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are either blocking or looping. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are either blocking or looping. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Internet-like networks between a company and its business partners. Select the best fit for answer: Switching alternating Extranets Inter organizational networks Bandwidth alternatives Switching alternating Extranets Inter organizational networks Bandwidth alternatives ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding VLANs? VTP is used to send VLAN information to switches in a configured VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. You must have at least two VLANs defined in every Cisco switched network. You should not have more than 10 switches in the same VTP domain. VTP is used to send VLAN information to switches in a configured VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. You must have at least two VLANs defined in every Cisco switched network. You should not have more than 10 switches in the same VTP domain. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 14 slots 5 slots 7 slots None of these 10 slots 14 slots 5 slots 7 slots None of these 10 slots ANSWER DOWNLOAD EXAMIANS APP