Computer Networking Which application allows a user to access and change remote files without actual transfer? None of these FTP NFS TELNET DNS None of these FTP NFS TELNET DNS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Fiber-optic cable Thinnet coax Category 5 UTP cable Thicknet coax Fiber-optic cable Thinnet coax Category 5 UTP cable Thicknet coax ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two of the following are true regarding the distance-vector and link-state routing protocols?1. Link state sends its complete routing table out all active interfaces on periodic time intervals.2. Distance vector sends its complete routing table out all active interfaces on periodic time intervals.3. Link state sends updates containing the state of its own links to all routers in the internetwork.4. Distance vector sends updates containing the state of its own links to all routers in the internetwork. 3 only 2 and 3 only None of these 1 only 3 only 2 and 3 only None of these 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? 185, 0xB9 157, 0x9D 159, 0x9F 155, 0x9B 185, 0xB9 157, 0x9D 159, 0x9F 155, 0x9B ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at a data link level is achieved by equalization bit stuffing cyclic redundancy codes None of these Hamming codes equalization bit stuffing cyclic redundancy codes None of these Hamming codes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class B network? 255.255.255.0 None of these 127.0.01 255.0.0.0 255.255.0.0 255.255.255.0 None of these 127.0.01 255.0.0.0 255.255.0.0 ANSWER DOWNLOAD EXAMIANS APP