Computer Networking Error control is needed at the transport layer because of potential errors occurring _____. from packet losses. from out-of-sequence delivery from transmission line noise in routers from packet losses. from out-of-sequence delivery from transmission line noise in routers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? CSMA/CD Collision detection Time sharing Switched repeaters Token passing CSMA/CD Collision detection Time sharing Switched repeaters Token passing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are unsuccessful in telnetting into a remote device. What could the problem be?1. IP addresses are incorrect.2. Access control list is filtering Telnet.3. There is a defective serial cable.4. The VTY password is missing. 3 only 2 and 4 only 1 only All of these 3 only 2 and 4 only 1 only All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a multicast address? Packets addressed to a unicast address are delivered to a single interface. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Identifies multiple interfaces and is only delivered to one address. This address can also be called one-to-one-of-many. Packets addressed to a unicast address are delivered to a single interface. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Identifies multiple interfaces and is only delivered to one address. This address can also be called one-to-one-of-many. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 2 and 4 1, 4 and 6 3 and 5 1 and 4 2 and 4 1, 4 and 6 3 and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 3 Layer 4 Layer 2 Layer 7 Layer 3 Layer 4 Layer 2 Layer 7 ANSWER DOWNLOAD EXAMIANS APP