Computer Networking What operates in the Data Link and the Network layer? NIC Router Brouter Bridge None of these NIC Router Brouter Bridge None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____. All of these 3, 2, 1, 7 3, 2, 1, none 3, 3, 1, 7 3, 3, 2, none All of these 3, 2, 1, 7 3, 2, 1, none 3, 3, 1, 7 3, 3, 2, none ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class C network? 255.255.255.0 255.0.0.0 None of these 255.255.0.0 127.0.0.1 255.255.255.0 255.0.0.0 None of these 255.255.0.0 127.0.0.1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol does PPP use to identify the Network layer protocol? NCP ISDN LCP HDLC NCP ISDN LCP HDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A central computer surrounded by one or more satellite computers is called a bus network ring network star network All of these None of these bus network ring network star network All of these None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP