Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 2 only 3 only 1 and 2 1, 3 and 4 2 only 3 only 1 and 2 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or switch console port? Crossover with a CSU/DSU Rolled Crossover cable Straight-through Crossover with a CSU/DSU Rolled Crossover cable Straight-through ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)? first seven None of these first three first five first four first seven None of these first three first five first four ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign? 255.255.252.0 255.255.240.0 255.255.255.255 255.255.224.0 255.255.248.0 255.255.252.0 255.255.240.0 255.255.255.255 255.255.224.0 255.255.248.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following digits are known as the area code of the Network User Address (NUA)? 05-Jul 01-Apr None of these 13-14 08-Dec 05-Jul 01-Apr None of these 13-14 08-Dec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? HDLC VPN IPSec Cable xDSL HDLC VPN IPSec Cable xDSL ANSWER DOWNLOAD EXAMIANS APP