Computer Networking Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size? 4 None of these 8 15 16 4 None of these 8 15 16 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude-shift keying Aloha None of these Amplitude Amplitude modulation Amplitude-shift keying Aloha None of these Amplitude Amplitude modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router? show interface Ethernet 0 show access-lists show ip interface Ethernet 0 show ip access-lists show interface Ethernet 0 show access-lists show ip interface Ethernet 0 show ip access-lists ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What operates in the Data Link and the Network layer? Router None of these Bridge NIC Brouter Router None of these Bridge NIC Brouter ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In session layer, during data transfer, the data stream responsible for the "control" purpose (i.e control of the session layer itself) is Regular Data Expedited Data Typed data Capability Data Regular Data Expedited Data Typed data Capability Data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you want to disable STP on a port connected to a server, which command would you use? disable spanning-tree spanning-tree security spanning-tree off spanning-tree portfast disable spanning-tree spanning-tree security spanning-tree off spanning-tree portfast ANSWER DOWNLOAD EXAMIANS APP