Computer Networking What protocol is used between E-Mail servers? POP3 None of these SNMP FTP SMTP POP3 None of these SNMP FTP SMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that is 172.16.0.0 and would like to support 600 hosts per subnet. What subnet mask should you use? 255.255.224.0 255.255.248.0 255.255.192.0 255.255.240.0 255.255.252.0 255.255.224.0 255.255.248.0 255.255.192.0 255.255.240.0 255.255.252.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following performs modulation and demodulation? None of these fiber optic coaxial cable modem satellite None of these fiber optic coaxial cable modem satellite ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: hierarchical network spider network ring network data control network None of these hierarchical network spider network ring network data control network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.224.0 255.255.252.0 255.255.192.0 255.255.240.0 255,255.248.0 255.255.224.0 255.255.252.0 255.255.192.0 255.255.240.0 255,255.248.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transfer of data from a CPU to peripheral devices of a computer is achieved through computer ports modems None of these buffer memory interfaces computer ports modems None of these buffer memory interfaces ANSWER DOWNLOAD EXAMIANS APP