Computer Networking What protocol is used to find the hardware address of a local device? IP ARP RARP ICMP IP ARP RARP ICMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 4 only 1 and 2 3 and 4 1 only 4 only 1 and 2 3 and 4 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which application allows a user to access and change remote files without actual transfer? TELNET NFS DNS FTP None of these TELNET NFS DNS FTP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking X.21 is network access standard for connecting stations to a circuit-switched network a method access control technique for multiple-access transmission media a very common bit-oriented data link protocol issued by ISO a method of determining which device has access to the transmission medium at any time None of these network access standard for connecting stations to a circuit-switched network a method access control technique for multiple-access transmission media a very common bit-oriented data link protocol issued by ISO a method of determining which device has access to the transmission medium at any time None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Two Four Three Six Five Two Four Three Six Five ANSWER DOWNLOAD EXAMIANS APP