Computer Networking On a class C network with a subnet mask of 192, how many subnets are available? 62 254 30 2 14 62 254 30 2 14 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? DHCP SMTP ARP SNMP DHCP SMTP ARP SNMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server? RARP None of these RDP RIP X.25 RARP None of these RDP RIP X.25 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? Modem options Handshaking Protocol None of these Duplexing Modem options Handshaking Protocol None of these Duplexing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP