Computer Networking In cyclic redundancy checking what is the CRC? the divisor the remainder None of these the dividend the quotient the divisor the remainder None of these the dividend the quotient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the standard protocol for network management features? None of these SMS SNMP SNA FTP None of these SMS SNMP SNA FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? Decrease the sequence number. Decrease the window size. Restart the virtual circuit. Send a different source port number. Decrease the sequence number. Decrease the window size. Restart the virtual circuit. Send a different source port number. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts? 255.255.255.252 255.255.255.192 255.255.255.248 255.255.255.224 255.255.255.240 255.255.255.252 255.255.255.192 255.255.255.248 255.255.255.224 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. ANSWER DOWNLOAD EXAMIANS APP