Computer Networking Select the wrong data communication system component: Protocol Medium Transits Receiver Protocol Medium Transits Receiver ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is not a standard synchronous communication protocol? None of these SLIP SMTP PAS SDLC None of these SLIP SMTP PAS SDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called? None of these Telemailing Teletalking Telemeeting Teleconferencing None of these Telemailing Teletalking Telemeeting Teleconferencing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will delete the contents of NVRAM on a router? delete startup-config erase NVRAM delete NVRAM erase start delete startup-config erase NVRAM delete NVRAM erase start ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 1 and 3 2 and 4 4 and 5 2, 3 and 5 1 and 3 2 and 4 4 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Time sharing Token passing CSMA/CD Switched repeaters Collision detection Time sharing Token passing CSMA/CD Switched repeaters Collision detection ANSWER DOWNLOAD EXAMIANS APP