Computer Networking What is the first octet range for a class B IP address? 127 - 191 128 - 255 1 - 127 128 - 191 192 - 223 127 - 191 128 - 255 1 - 127 128 - 191 192 - 223 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Category 5 UTP cable Fiber-optic cable Thinnet coax Thicknet coax Category 5 UTP cable Fiber-optic cable Thinnet coax Thicknet coax ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Frames from one LAN can be transmitted to another LAN via the device Repeater Router None of these Modem Bridge Repeater Router None of these Modem Bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of flow control? To regulate the size of each segment. To reassemble segments in the correct order at the destination device. To ensure that data is retransmitted if an acknowledgment is not received. To provide a means for the receiver to govern the amount of data sent by the sender. To regulate the size of each segment. To reassemble segments in the correct order at the destination device. To ensure that data is retransmitted if an acknowledgment is not received. To provide a means for the receiver to govern the amount of data sent by the sender. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 4, 5 and 6 1, 2 and 6 2, 3 and 4 2, 4, and 5 4, 5 and 6 1, 2 and 6 2, 3 and 4 2, 4, and 5 ANSWER DOWNLOAD EXAMIANS APP