Computer Networking Which encapsulations can be configured on a serial interface?1. Ethernet2. Token Ring3. HDLC4. Frame Relay5. PPP 3, 4 and 5 1 and 4 All of these 2 only 3, 4 and 5 1 and 4 All of these 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 3 and 4 4 only 1 only 1 and 2 3 and 4 4 only 1 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? 159, 0x9F 157, 0x9D 155, 0x9B 185, 0xB9 159, 0x9F 157, 0x9D 155, 0x9B 185, 0xB9 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router? (config-if)# blocksales ip access-list in (config)# ip access-group 110 in (config-if)# ip access-group Blocksales in (config-if)# ip access-group 110 in (config-if)# blocksales ip access-list in (config)# ip access-group 110 in (config-if)# ip access-group Blocksales in (config-if)# ip access-group 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224? Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero ANSWER DOWNLOAD EXAMIANS APP