Computer Networking In a network with dozens of switches, how many root bridges would you have? 2 12 5 1 2 12 5 1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The updated information will be added to the existing routing table. They will all load-balance. The update will be ignored and no further action will occur. The updated information will replace the existing routing table entry. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The updated information will be added to the existing routing table. They will all load-balance. The update will be ignored and no further action will occur. The updated information will replace the existing routing table entry. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use? 255.224.0.0 255.254.0.0 255.248.0.0 255.240.0.0 255.252.0.0 255.224.0.0 255.254.0.0 255.248.0.0 255.240.0.0 255.252.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use TCP?1. DHCP2. SMTP3. HTTP4. TFTP5. FTP 1, 2 and 4 1, 3 and 4 1 and 2 2, 3 and 5 1, 2 and 4 1, 3 and 4 1 and 2 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When UPC is used, the price of the item is located on the item None of these on the item and on the shelf in computer storage on the shelf and in computer storage on the item None of these on the item and on the shelf in computer storage on the shelf and in computer storage ANSWER DOWNLOAD EXAMIANS APP