Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 2 and 6 2, 4 and 6 1, 3 and 5 3 and 5 2 and 6 2, 4 and 6 1, 3 and 5 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an advantage to using fiber optics data transmission? All of these fast data transmission rate few transmission errors resistance to data theft low noise level All of these fast data transmission rate few transmission errors resistance to data theft low noise level ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? The update will be ignored and no further action will occur. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The updated information will replace the existing routing table entry. The updated information will be added to the existing routing table. They will all load-balance. The update will be ignored and no further action will occur. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The updated information will replace the existing routing table entry. The updated information will be added to the existing routing table. They will all load-balance. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? None of these FTP RPC SNMP SMTP None of these FTP RPC SNMP SMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use UDP?1. DHCP2. SMTP3. SNMP4. FTP5. HTTP6. TFTP 2 and 4 1, 2 and 4 All of these 1, 3 and 6 2 and 4 1, 2 and 4 All of these 1, 3 and 6 ANSWER DOWNLOAD EXAMIANS APP