Computer Networking The communication mode that supports two-way traffic but only one direction at a time is None of these half duplex duplex simplex multiplex None of these half duplex duplex simplex multiplex ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device An additional token is added for every 1,000 nodes The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many subnets are available with a subnet mask of 248? 30 62 6 126 2 30 62 6 126 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used between E-Mail servers? FTP SMTP SNMP POP3 None of these FTP SMTP SNMP POP3 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two of the following commands will place network 10.2.3.0/24 into area 0?1. router eigrp 102. router ospf 103. network 10.0.0.04. network 10.2.3.0 0.0.0.255 area05. network 10.2.3.0 0.0.0.255 area 0 2, 4, and 5 3 and 4 2 and 5 1 and 4 2, 4, and 5 3 and 4 2 and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP