Computer Networking Which file transfer protocol uses UDP? TFTP TELNET None of these FTP NFS TFTP TELNET None of these FTP NFS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To back up an IOS, what command will you use? copy ios tftp copy flash tftp backup IOS disk copy tftp flash copy ios tftp copy flash tftp backup IOS disk copy tftp flash ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which IP address class has few hosts per network? A None of these B D C A None of these B D C ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be 32 5 20 10 None of these 32 5 20 10 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? None of these to determine the type of switching used in a data link. to determine the flow of data to detect problems in protocols to determine the type of transmission used in a data link None of these to determine the type of switching used in a data link. to determine the flow of data to detect problems in protocols to determine the type of transmission used in a data link ANSWER DOWNLOAD EXAMIANS APP