Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude-shift keying None of these Aloha Amplitude Amplitude modulation Amplitude-shift keying None of these Aloha Amplitude Amplitude modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Add the destination to the MAC address table and then forward the frame Flood the network with the frame Discard it and send an error message back to the originating host Add the source address and port to the MAC address table and forward the frame out the destination port Add the destination to the MAC address table and then forward the frame Flood the network with the frame Discard it and send an error message back to the originating host Add the source address and port to the MAC address table and forward the frame out the destination port ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?Corp#sh ip route[output cut]R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0C 192.168.20.0 is directly connected, Serial0/0C 192.168.214.0 is directly connected, FastEthernet0/0 The packet will be routed out the Fa0/0 interface. The packet will be routed out the S0/0 interface. The packet will be discarded. The router will broadcast looking for the destination. They will all load-balance. The packet will be routed out the Fa0/0 interface. The packet will be routed out the S0/0 interface. The packet will be discarded. The router will broadcast looking for the destination. They will all load-balance. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation is the process of converting analog signals to digital signals performing data encryption. Multiplexing various signals into high speed line signals converting digital signals to analog signals converting analog signals to digital signals performing data encryption. Multiplexing various signals into high speed line signals converting digital signals to analog signals ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 2, 3 and 5 1 and 2 1, 3 and 4 3, 4 and 5 2, 3 and 5 1 and 2 1, 3 and 4 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP