Computer Networking What operates in the Data Link and the Network layer? NIC Router Bridge None of these Brouter NIC Router Bridge None of these Brouter ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The encoding method specified in the EIA-232 standard is _____. Differential Manchester NRZ-L Manchester NRZ-I None of these Differential Manchester NRZ-L Manchester NRZ-I None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the most commonly used transmission speeds in BPS used in data communication? None of these 9600 1200 2400 300 None of these 9600 1200 2400 300 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Five Two Six Three Four Five Two Six Three Four ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /30 /27 /29 /28 /30 /27 /29 /28 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches? The MAC forward/filter table will not update on the switch. Broadcast storms will occur on the switched network. The routing tables on the switches will not update. The switches will automatically load-balance between the two links. The MAC forward/filter table will not update on the switch. Broadcast storms will occur on the switched network. The routing tables on the switches will not update. The switches will automatically load-balance between the two links. ANSWER DOWNLOAD EXAMIANS APP