Computer Networking What is the purpose of flow control? To ensure that data is retransmitted if an acknowledgment is not received. To reassemble segments in the correct order at the destination device. To regulate the size of each segment. To provide a means for the receiver to govern the amount of data sent by the sender. To ensure that data is retransmitted if an acknowledgment is not received. To reassemble segments in the correct order at the destination device. To regulate the size of each segment. To provide a means for the receiver to govern the amount of data sent by the sender. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following refers to the terms "residual error rate"? the number of bit errors per twenty four hours of continuous operation on an asynchronous line None of these signal to noise ratio divided by the ratio of energy per bit to noise per hertz The probability that one or more errors will be undetected when an error detection scheme is used the probability that one or more errors will be detected when an error detection mechanism is used the number of bit errors per twenty four hours of continuous operation on an asynchronous line None of these signal to noise ratio divided by the ratio of energy per bit to noise per hertz The probability that one or more errors will be undetected when an error detection scheme is used the probability that one or more errors will be detected when an error detection mechanism is used ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch? 100Mbps Ethernet 56Kbps Serial 10Mbps Ethernet 1Gbps Ethernet 100Mbps Ethernet 56Kbps Serial 10Mbps Ethernet 1Gbps Ethernet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So different networks could communicate. So application developers can change only one layer's protocols at a time. So Cisco could use the model. To create a layered model larger than the DoD model. So different networks could communicate. So application developers can change only one layer's protocols at a time. So Cisco could use the model. To create a layered model larger than the DoD model. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main difference between DDCMP and SDLG? None of these SDLC does not use CRC DDCMP does not need special hardware to final the beginning of a message. SDLC has a IP address DDCMP has a message header None of these SDLC does not use CRC DDCMP does not need special hardware to final the beginning of a message. SDLC has a IP address DDCMP has a message header ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP