Computer Networking Error detection at the data link level is achieved by Equalization Bit Stuffing Hamming Code Cyclic Redundancy Code Equalization Bit Stuffing Hamming Code Cyclic Redundancy Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk all switchport trunk on trunk on switchport mode trunk trunk all switchport trunk on trunk on switchport mode trunk ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What operates in the Data Link and the Network layer? Router None of these NIC Brouter Bridge Router None of these NIC Brouter Bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply two access lists to any interface. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? In an improperly implemented redundant topology When upper-layer protocols require high reliability During high-traffic periods After broken links are reestablished In an improperly implemented redundant topology When upper-layer protocols require high reliability During high-traffic periods After broken links are reestablished ANSWER DOWNLOAD EXAMIANS APP