Computer Networking What is the purpose of flow control? To ensure that data is retransmitted if an acknowledgment is not received. To regulate the size of each segment. To reassemble segments in the correct order at the destination device. To provide a means for the receiver to govern the amount of data sent by the sender. To ensure that data is retransmitted if an acknowledgment is not received. To regulate the size of each segment. To reassemble segments in the correct order at the destination device. To provide a means for the receiver to govern the amount of data sent by the sender. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will show you whether a DTE or a DCE cable is plugged into serial 0? sh int serial 0 show serial 0 controllers sh int s0 show controllers serial 0 sh int serial 0 show serial 0 controllers sh int s0 show controllers serial 0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM? Amplitude modulation Frequency-division multiple access Frequency-shift keying None of these Frequency modulation Amplitude modulation Frequency-division multiple access Frequency-shift keying None of these Frequency modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement describes a spanning-tree network that has converged? All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are either blocking or looping. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are either blocking or looping. All switch and bridge ports are assigned as either root or designated ports. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which file transfer protocol uses UDP? TFTP FTP NFS TELNET None of these TFTP FTP NFS TELNET None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP