Computer Networking What command is used to create a backup configuration? wr mem config mem copy running backup copy running-config startup-config wr mem config mem copy running backup copy running-config startup-config ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following types of connections can use full duplex?1. Hub to hub2. Switch to switch3. Host to host4. Switch to hub5. Switch to host 1, 2 and 4 2, 3 and 5 3 and 5 3 and 4 1, 2 and 4 2, 3 and 5 3 and 5 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Different computers are connected to a LAN by a cable and a/an modem interface card special wires None of these telephone lines modem interface card special wires None of these telephone lines ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11g standard? 2.4GHz 2.4Gbps 5Gbps 5GHz 2.4GHz 2.4Gbps 5Gbps 5GHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a link-local address? These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How does a host on an Ethernet LAN know when to transmit after a collision has occurred?1. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.2. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.3. You can improve the CSMA/CD network by adding more hubs.4. After a collision, the station that detected the collision has first priority to resend the lost data.5. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. 1 and 3 1,3 and 4 2 and 5 2 and 4 1 and 3 1,3 and 4 2 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP