Computer Networking What is the maximum number of entries in the HOSTS file? 8 255 Unlimited None of these 500 8 255 Unlimited None of these 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /28 /30 /27 /29 /28 /30 /27 /29 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?1. A crossover cable should be used in place of the straight-through cable.2. A rollover cable should be used in place of the straight-through cable.3. The subnet masks should be set to 255.255.255.192.4. A default gateway needs to be set on each host.5. The subnet masks should be set to 255.255.255.0. 1 only 3 and 4 only 2 only 2 and 5 only 1 and 5 only 1 only 3 and 4 only 2 only 2 and 5 only 1 and 5 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? to determine the type of switching used in a data link. to detect problems in protocols to determine the type of transmission used in a data link to determine the flow of data None of these to determine the type of switching used in a data link. to detect problems in protocols to determine the type of transmission used in a data link to determine the flow of data None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking End-to-end connectivity is provided from host-to-host in: None of these Transport layer Data link layer Session layer Network layer None of these Transport layer Data link layer Session layer Network layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What part of 192.168.10.51 is the Network ID, assuming a default subnet mask? 0.0.0.5 192.168.10 51 192 None of these 0.0.0.5 192.168.10 51 192 None of these ANSWER DOWNLOAD EXAMIANS APP