Computer Networking Which command is used to determine if an IP access list is enabled on a particular interface? show access-lists show interface access-lists show ip interface show interface show access-lists show interface access-lists show ip interface show interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? An alias for the computer name A logical address that identifies the workstation The logical domain address for the workstation A physical address that is assigned by the manufacturer A physical address that is randomly assigned each time the computer is started An alias for the computer name A logical address that identifies the workstation The logical domain address for the workstation A physical address that is assigned by the manufacturer A physical address that is randomly assigned each time the computer is started ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Communication between computers is almost always series parallel parallel serial None of these direct series parallel parallel serial None of these direct ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Devices interconnected by the LAN should include All of these None of these mass storage device, printers and plotters bridges and gateways Computers and terminals All of these None of these mass storage device, printers and plotters bridges and gateways Computers and terminals ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size? 16 4 8 None of these 15 16 4 8 None of these 15 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? None of these to determine the flow of data to detect problems in protocols to determine the type of transmission used in a data link to determine the type of switching used in a data link. None of these to determine the flow of data to detect problems in protocols to determine the type of transmission used in a data link to determine the type of switching used in a data link. ANSWER DOWNLOAD EXAMIANS APP