Computer Networking What command will display the line, protocol, DLCI, and LMI information of an interface? sh pvc show run show interface show frame-relay pvc sh pvc show run show interface show frame-relay pvc ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transport layer protocol is connectionless. UDP TCP None of these FTP NVT UDP TCP None of these FTP NVT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command displays the configuration register setting? show flash show boot version show version show ip route show flash show boot version show version show ip route ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols uses both TCP and UDP? FTP DNS Telnet SMTP FTP DNS Telnet SMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. They acknowledge receipt of a TCP segment.2. They guarantee datagram delivery.3. They can provide hosts with information about network problems.4. They are encapsulated within IP datagrams. 2, 3 and 4 2 and 3 3 and 4 1 only 2, 3 and 4 2 and 3 3 and 4 1 only ANSWER DOWNLOAD EXAMIANS APP