Computer Networking Error detection at a data link level is achieved by bit stuffing Hamming codes None of these cyclic redundancy codes equalization bit stuffing Hamming codes None of these cyclic redundancy codes equalization ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If one link fails, only that link is affected. All other links remain active. Which topology does this? Mesh topology Star topology Bus topology Physical topology Mesh topology Star topology Bus topology Physical topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? copy running-config startup-config config mem copy running backup wr mem copy running-config startup-config config mem copy running backup wr mem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which transmission mode is used for data communication along telephone lines? None of these Parallel Synchronous Asynchronous Serial None of these Parallel Synchronous Asynchronous Serial ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So application developers can change only one layer's protocols at a time. To create a layered model larger than the DoD model. So Cisco could use the model. So different networks could communicate. So application developers can change only one layer's protocols at a time. To create a layered model larger than the DoD model. So Cisco could use the model. So different networks could communicate. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used between E-Mail servers? SMTP POP3 None of these FTP SNMP SMTP POP3 None of these FTP SNMP ANSWER DOWNLOAD EXAMIANS APP