Computer Networking In OSI model, which of the following layer provides error-free delivery of data? None of these Network Data link transport Session None of these Network Data link transport Session ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue? Router> show interface Router> trace Router> ping Router> show ip route Router> show interface Router> trace Router> ping Router> show ip route ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission None of these two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission None of these two bits or any even number of bits inverted in a block during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 1 and 2 1, 3 and 4 2 only 3 only 1 and 2 1, 3 and 4 2 only 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system? None of these Log-on procedure Security procedure Safeguard procedure Identification procedure None of these Log-on procedure Security procedure Safeguard procedure Identification procedure ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 1 and 2 3 and 4 2 and 4 1 and 3 1 and 2 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP