Computer Networking In cyclic redundancy checking what is the CRC? the quotient the remainder the divisor None of these the dividend the quotient the remainder the divisor None of these the dividend ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following condition is used to transmit two packets over a medium at the same time? Collision Synchronous Contention None of these Asynchronous Collision Synchronous Contention None of these Asynchronous ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 4 5 3 2 4 5 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? frame-relay interface-dci frame-relay lmi-type frame-relay arp frame-relay map frame-relay interface-dci frame-relay lmi-type frame-relay arp frame-relay map ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols None of these Layer 7 protocols Layer 6 protocols Layer 5 protocols Layer 4 protocols None of these Layer 7 protocols Layer 6 protocols Layer 5 protocols ANSWER DOWNLOAD EXAMIANS APP