Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Time sharing CSMA/CD Token passing Collision detection Switched repeaters Time sharing CSMA/CD Token passing Collision detection Switched repeaters ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a host knows its physical address but not its IP address, it can use _____. None of these IGMP ARP RARP ICMP None of these IGMP ARP RARP ICMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The synchronous modems are more costly than the asynchronous modems because they contain clock recovery circuits they operate with a larger bandwidth they transmit the data with stop and start bits. they produce large volume of data None of these they contain clock recovery circuits they operate with a larger bandwidth they transmit the data with stop and start bits. they produce large volume of data None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts? 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?1. show version2. show protocols3. show interfaces4. show controllers5. show ip interface 3 and 4 only None of these 1, 2 and 4 2, 3 and 5 3 and 4 only None of these 1, 2 and 4 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking End-to-end connectivity is provided from host-to-host in: Transport layer None of these Network layer Session layer Data link layer Transport layer None of these Network layer Session layer Data link layer ANSWER DOWNLOAD EXAMIANS APP