Computer Networking What is the maximum distance with maximum data rate for 802.11b? About 150 feet Over 200 feet About 90-100 feet About 65-75 feet About 150 feet Over 200 feet About 90-100 feet About 65-75 feet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: ring network spider network None of these hierarchical network data control network ring network spider network None of these hierarchical network data control network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The coming together of three technologies i.e. microelectronics, computing and communications has ushered in None of these educational upgradation information technology business revolution information explosion None of these educational upgradation information technology business revolution information explosion ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a link-local address? These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To test the IP stack on your local host, which IP address would you ping? 127.0.0.255 127.0.0.1 127.0.0.0 1.0.0.127 127.0.0.255 127.0.0.1 127.0.0.0 1.0.0.127 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP