Computer Networking Error detection at the data link level is achieved by Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 2 and 4 3 and 4 1 and 2 1 and 3 2 and 4 3 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 2 only 1,2 and 3 1 and 4 4 only 2 only 1,2 and 3 1 and 4 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? 80,000 B frame 8000 B frame 10,000 B frame 8 x 105 bit frame 80,000 B frame 8000 B frame 10,000 B frame 8 x 105 bit frame ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? 255.252.0.0 255.248.0.0 255.240.0.0 255.255.255.255 255.254.0.0 255.252.0.0 255.248.0.0 255.240.0.0 255.255.255.255 255.254.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 4 3 5 2 4 3 5 ANSWER DOWNLOAD EXAMIANS APP