Computer Networking MAC is network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued to ISO. a method access control technique or multiple-access transmission media None of these network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued to ISO. a method access control technique or multiple-access transmission media None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Devices on one network can communicate with devices on another network via a printer server utility server gateway None of these file server printer server utility server gateway None of these file server ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring, because it uses a MAU Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Ethernet, because it is cabled using fiber-optic cable Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring, because it uses a MAU Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Ethernet, because it is cabled using fiber-optic cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the subnetwork address for a host with the IP address 200.10.5.68/28? 200.10.5.56 200.10.5.64 200.10.5.32 200.10.5.0 200.10.5.56 200.10.5.64 200.10.5.32 200.10.5.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?1. TFTP server software must be running on the router.2. TFTP server software must be running on your laptop.3. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable.4. The laptop must be on the same subnet as the router's Ethernet interface.5. The copy flash tftp command must be supplied the IP address of the laptop. 5 only 3 and 5 only 2, 4 and 5 1, 3 and 4 5 only 3 and 5 only 2, 4 and 5 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table? The IGRP route has fewer hops. IGRP has a lower administrative distance. IGRP has a faster update timer. RIP has a higher metric value for that route. The IGRP route has fewer hops. IGRP has a lower administrative distance. IGRP has a faster update timer. RIP has a higher metric value for that route. ANSWER DOWNLOAD EXAMIANS APP