Computer Networking What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? Duplexing Handshaking Modem options Protocol None of these Duplexing Handshaking Modem options Protocol None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Ethernet, because it is cabled using fiber-optic cable Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Token-Ring, because it uses a MAU Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Ethernet, because it is cabled using fiber-optic cable Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Token-Ring, because it uses a MAU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Virtual Private Network OSI Network operating system Network Server Virtual Private Network OSI Network operating system Network Server ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size? 4 15 16 None of these 8 4 15 16 None of these 8 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 15 14 30 16 15 14 30 16 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? repeater None of these gateway hub bridge repeater None of these gateway hub bridge ANSWER DOWNLOAD EXAMIANS APP