Computer Networking Which command would you place on interface connected to the Internet? ip inside local ip nat outside ip outside global ip nat inside ip inside local ip nat outside ip outside global ip nat inside ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration? Ping the address of the local host None of these Ping a distant router. Ping the Microsoft Web site Ping the broadcast address Ping the address of the local host None of these Ping a distant router. Ping the Microsoft Web site Ping the broadcast address ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate? 3 Kbps 24 Kbps. 6 Kbps 12 Kbps 3 Kbps 24 Kbps. 6 Kbps 12 Kbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Flood the network with the frame Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Flood the network with the frame Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port ANSWER DOWNLOAD EXAMIANS APP