Computer Networking What is the first octet range for a class C IP address? 192 - 226 1 - 126 192 - 223 128 - 191 192 - 255 192 - 226 1 - 126 192 - 223 128 - 191 192 - 255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Cisco's Unified Wireless Solution provides a mesh solution. What devices do you absolutely need to purchase to run a Cisco solution?1. WCS2. Controller3. Access point4. Bridge 1 and 4 only 1 and 2 4 only 2 and 3 1 and 4 only 1 and 2 4 only 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two of the following are true regarding the distance-vector and link-state routing protocols?1. Link state sends its complete routing table out all active interfaces on periodic time intervals.2. Distance vector sends its complete routing table out all active interfaces on periodic time intervals.3. Link state sends updates containing the state of its own links to all routers in the internetwork.4. Distance vector sends updates containing the state of its own links to all routers in the internetwork. None of these 2 and 3 only 3 only 1 only None of these 2 and 3 only 3 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are like private addresses in IPv4 in that they are not meant to be routed. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If one link fails, only that link is affected. All other links remain active. Which topology does this? Bus topology Physical topology Mesh topology Star topology Bus topology Physical topology Mesh topology Star topology ANSWER DOWNLOAD EXAMIANS APP