Computer Networking The topology with highest reliability is: Mesh topology Ring topology Star topology Bus topology Mesh topology Ring topology Star topology Bus topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following files is used for NetBIOS name resolution? LMHOSTS None of these ARP FQDN HOSTS LMHOSTS None of these ARP FQDN HOSTS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many OSI layers are covered in the X.25 standard? seven three six None of these two seven three six None of these two ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following does not allow multiple users or devices to share one communications line? multipplexer controller concentrator doubleplexer None of these multipplexer controller concentrator doubleplexer None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router? show interface Ethernet 0 show ip interface Ethernet 0 show ip access-lists show access-lists show interface Ethernet 0 show ip interface Ethernet 0 show ip access-lists show access-lists ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length. 2 (m - 2) 2 (2m - 1) m - 1 (2m - l)/mJ 2 (m - 2) 2 (2m - 1) m - 1 (2m - l)/mJ ANSWER DOWNLOAD EXAMIANS APP