Computer Networking CSMA (Carrier Sense Multiple Access) is a very common bit-oriented data link protocol issued by ISO. network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time None of these a method access control technique for multiple-access transmission media. a very common bit-oriented data link protocol issued by ISO. network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time None of these a method access control technique for multiple-access transmission media. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class C network? 255.0.0.0 127.0.0.1 255.255.255.0 None of these 255.255.0.0 255.0.0.0 127.0.0.1 255.255.255.0 None of these 255.255.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement(s) about IPv4 and IPv6 addresses are true? 1. An IPv6 address is 32 bits long, represented in hexidecimal. 2. An IPv6 address is 128 bits long, represented in decimal. 3. An IPv4 address is 32 bits long, represented in decimal. 4. An IPv6 address is 128 bits long, represented in hexidecimal. 1 and 3 only 3 and 4 2 and 4 2 only 1 and 3 only 3 and 4 2 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols support VLSM, summarization, and discontiguous networking?1. RIPv12. IGRP3. EIGRP4. OSPF5. BGP6. RIPv2 3, 4 and 6 2 and 5 All of these 1 and 4 3, 4 and 6 2 and 5 All of these 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will delete the contents of NVRAM on a router? erase NVRAM erase start delete startup-config delete NVRAM erase NVRAM erase start delete startup-config delete NVRAM ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. ANSWER DOWNLOAD EXAMIANS APP