Computer Networking What protocol is used between E-Mail servers? SMTP FTP POP3 None of these SNMP SMTP FTP POP3 None of these SNMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking End-to-end connectivity is provided from host-to-host in: None of these Data link layer Network layer Transport layer Session layer None of these Data link layer Network layer Transport layer Session layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? repeater gateway hub None of these bridge repeater gateway hub None of these bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Sending a file from your personal computer's primary memory or disk to another computer is called uploading None of these downloading logging on hang on uploading None of these downloading logging on hang on ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP