Computer Networking What can cause a problem with communication with a client by name but not by IP address? The default gateway Subnet mask The IP address Static files such as an LMHOSTS file or a DNS database None of these The default gateway Subnet mask The IP address Static files such as an LMHOSTS file or a DNS database None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 2 only 4 only 1 and 4 1,2 and 3 2 only 4 only 1 and 4 1,2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice? Ethernet Token-Ring ARCnet CSMA/CA CSMA/CD Ethernet Token-Ring ARCnet CSMA/CA CSMA/CD ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In OSI network architecture, the dialogue control and token management are responsibilities of network layer session layer data link layer None of these transport layer network layer session layer data link layer None of these transport layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following divides the high speed signal into frequency bands? frequency-division multiplexer time-division multiplexer None of these modem t-switch frequency-division multiplexer time-division multiplexer None of these modem t-switch ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP