Computer Networking What is the default subnet mask for a class A network? 127.0.0.1 255.255.255.0.0 255.255.255.0 255.0.0.0 None of these 127.0.0.1 255.255.255.0.0 255.255.255.0 255.0.0.0 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does the command routerA (config) #line cons 0 allow you to perform next? Disable console connections. Set your console password. Set the Telnet password. Shut down the router. Disable console connections. Set your console password. Set the Telnet password. Shut down the router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is None of these Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) None of these Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following might be used by a company to satisfy its growing communications needs? multiplexer All of these controller front-end processor concentrator multiplexer All of these controller front-end processor concentrator ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 3 3, 4 and 5 1 and 4 2 and 3 1 and 3 3, 4 and 5 1 and 4 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of flow control? To reassemble segments in the correct order at the destination device. To ensure that data is retransmitted if an acknowledgment is not received. To provide a means for the receiver to govern the amount of data sent by the sender. To regulate the size of each segment. To reassemble segments in the correct order at the destination device. To ensure that data is retransmitted if an acknowledgment is not received. To provide a means for the receiver to govern the amount of data sent by the sender. To regulate the size of each segment. ANSWER DOWNLOAD EXAMIANS APP