Computer Networking Modem is used in data transmission. When was it invented and in which country? 1965, Germany None of these 1950, USA 1950, Japan 1963, USA 1965, Germany None of these 1950, USA 1950, Japan 1963, USA ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?Corp#sh ip route[output cut]R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0C 192.168.20.0 is directly connected, Serial0/0C 192.168.214.0 is directly connected, FastEthernet0/0 They will all load-balance. The packet will be routed out the Fa0/0 interface. The router will broadcast looking for the destination. The packet will be discarded. The packet will be routed out the S0/0 interface. They will all load-balance. The packet will be routed out the Fa0/0 interface. The router will broadcast looking for the destination. The packet will be discarded. The packet will be routed out the S0/0 interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk on switchport trunk on switchport mode trunk trunk all trunk on switchport trunk on switchport mode trunk trunk all ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking For data communications to occur, the communicating devices must be part of a communication system made up of a combination of? All of these Hardware and software Full duplex and half duplex WAN and LAN All of these Hardware and software Full duplex and half duplex WAN and LAN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Time sharing Collision detection Switched repeaters Token passing CSMA/CD Time sharing Collision detection Switched repeaters Token passing CSMA/CD ANSWER DOWNLOAD EXAMIANS APP