Computer Networking The EIA-232 interface has _____ pins. 24 20 25 30 None of these 24 20 25 30 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type show running-config and get this output:[output cut]Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login[output cut]What do the two numbers following the exec-timeout command mean? If no command has been typed in 35 seconds, the console connection will be closed. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no command has been typed in 35 seconds, the console connection will be closed. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides? 192.168.168.129-191 192.168.168.128-190 192.168.168.128-192 192.168.168.129-190 192.168.168.129-191 192.168.168.128-190 192.168.168.128-192 192.168.168.129-190 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Fiber-optic cable Thinnet coax Category 5 UTP cable Thicknet coax Fiber-optic cable Thinnet coax Category 5 UTP cable Thicknet coax ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model? Cable VPN IPSec HDLC xDSL Cable VPN IPSec HDLC xDSL ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a block of data during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a block of data during transmission ANSWER DOWNLOAD EXAMIANS APP