Computer Networking
CSMA (Carrier Sense Multiple Access) is

a method access control technique for multiple-access transmission media.
a method of determining which device has access to the transmission medium at any time
a very common bit-oriented data link protocol issued by ISO.
None of these
network access standard for connecting stations to a circuit-switched network

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for fragment?

a technique used in best-effort delivery systems to avoid endlessly looping packets
None of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
All of these
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?1. TFTP server software must be running on the router.2. TFTP server software must be running on your laptop.3. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable.4. The laptop must be on the same subnet as the router's Ethernet interface.5. The copy flash tftp command must be supplied the IP address of the laptop.

5 only
3 and 5 only
1, 3 and 4
2, 4 and 5

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The data-link layer, in reference to the OSI model, specifies

All of these
None of these
data link procedures that provide for the exchange of data via frames that can be sent and received
the interface between the X.25 network and packet mode device
the virtual circuit interface to packet-switched service

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following are benefits of VLANs?1. They increase the size of collision domains.2. They allow logical grouping of users by function.3. They can enhance network security.4. They increase the size of broadcast domains while decreasing the number of collision domains.5. They simplify switch administration.6. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

2, 3 and 6
2 and 4
1, 3 and 5
1 and 5

ANSWER DOWNLOAD EXAMIANS APP