Computer Networking Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer: TCP/IP Protocol Open Systems Internetwork processor TCP/IP Protocol Open Systems Internetwork processor ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Network topology that supports bi-directional links between each possible node is Mesh Star Ring Tree Mesh Star Ring Tree ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which encapsulations can be configured on a serial interface?1. Ethernet2. Token Ring3. HDLC4. Frame Relay5. PPP 3, 4 and 5 All of these 1 and 4 2 only 3, 4 and 5 All of these 1 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Avalanche photodiode receivers can detect hits of transmitted data by receiving None of these 300 photons 100 photons 200 photons 400 photons None of these 300 photons 100 photons 200 photons 400 photons ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error detecting code Error rate Checksum Cyclic redundancy check None of these Error detecting code Error rate Checksum Cyclic redundancy check None of these ANSWER DOWNLOAD EXAMIANS APP