Computer Networking The CCITT Recommendation X.25 specifies three layers of communications: application, presentation and session datalink, network and transport physical datalink and network None of these Session, transport and network application, presentation and session datalink, network and transport physical datalink and network None of these Session, transport and network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error rate Cyclic redundancy check None of these Checksum Error detecting code Error rate Cyclic redundancy check None of these Checksum Error detecting code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the process identifier that is used to run OSPF on a router?1. It is locally significant.2. It is globally significant.3. It is needed to identify a unique instance of an OSPF database.4. It is an optional parameter required only if multiple OSPF processes are running on the router. 3 and 5 1 and 3 IS-IS All of these 1, 2 and 4 3 and 5 1 and 3 IS-IS All of these 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use? NETSTAT WINIPCFG PING IPCONFIG NBTSTAT NETSTAT WINIPCFG PING IPCONFIG NBTSTAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the correct cable that transport signals in the form of light: Shielded Twisted Pair cable Twisted-Pair cable Coaxial Cable Fiber optic cable Shielded Twisted Pair cable Twisted-Pair cable Coaxial Cable Fiber optic cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 3 only 1, 3 and 4 1 only 3 and 4 3 only 1, 3 and 4 1 only ANSWER DOWNLOAD EXAMIANS APP