Computer Networking What is the default subnet mask for a class A network? 255.255.255.0 127.0.0.1 None of these 255.255.255.0.0 255.0.0.0 255.255.255.0 127.0.0.1 None of these 255.255.255.0.0 255.0.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Aloha Amplitude modulation None of these Amplitude-shift keying Amplitude Aloha Amplitude modulation None of these Amplitude-shift keying Amplitude ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Network Server Network operating system Virtual Private Network OSI Network Server Network operating system Virtual Private Network OSI ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding RIPv2? It converges faster than RIPv1. It has a lower administrative distance than RIPv1. It has the same timers as RIPv1. It is harder to configure than RIPv1. It converges faster than RIPv1. It has a lower administrative distance than RIPv1. It has the same timers as RIPv1. It is harder to configure than RIPv1. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 1 and 2 3 and 4 1 only 4 only 1 and 2 3 and 4 1 only 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. You copied the wrong configuration into RAM. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. You copied the wrong configuration into RAM. The IOS became corrupted after the copy command was initiated. ANSWER DOWNLOAD EXAMIANS APP