Computer Networking Establishing a virtual connection is functionally equivalent to Placing a modem prior to a conversation Physically connecting a DTE and DCE None of these Placing a telephone call prior to a conversation Connecting as virtual memory Placing a modem prior to a conversation Physically connecting a DTE and DCE None of these Placing a telephone call prior to a conversation Connecting as virtual memory ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To enable RIPng, which of the following would you use? Router1(config-rtr)# no shutdown Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 Router1(config)# ipv6 router eigrp 10 Router1(config-if)# ipv6 router rip 1 Router1(config-rtr)# no shutdown Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 Router1(config)# ipv6 router eigrp 10 Router1(config-if)# ipv6 router rip 1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transmission signal coding method of TI carrier is called Bipolar Manchester None of these Binary NRZ Bipolar Manchester None of these Binary NRZ ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the result of segmenting a network with a bridge (switch)?1. It increases the number of collision domains.2. It decreases the number of collision domains.3. It increases the number of broadcast domains.4. It decreases the number of broadcast domains.5. It makes smaller collision domains.6. It makes larger collision domains. 3, 4 and 6 1 and 5 2, 3 and 5 1, 3 and 6 3, 4 and 6 1 and 5 2, 3 and 5 1, 3 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name of the device that converts computer output into a form that can be transmitted over a telephone line? Modem None of these Multiplexer Teleport Concentrator Modem None of these Multiplexer Teleport Concentrator ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. ANSWER DOWNLOAD EXAMIANS APP