Computer Networking Which class of IP address provides a maximum of only 254 host addresses per network ID? Class C Class B Class A Class D Class C Class B Class A Class D ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A modem that is attached to the telephone system by jamming the phone's handset into two flexible receptacles in the coupler? time-division multiplexer gateway acoustic coupler bridge None of these time-division multiplexer gateway acoustic coupler bridge None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured? PAP The Frame Relay encapsulation on the physical interface The local DLCI on each subinterface The subinterface type as point-to-point An IP address on the physical interface PAP The Frame Relay encapsulation on the physical interface The local DLCI on each subinterface The subinterface type as point-to-point An IP address on the physical interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an IEEE standard for frame tagging? 802.3Z ISL 802.3U 802.1Q 802.3Z ISL 802.3U 802.1Q ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP