Computer Networking Which of the following commands sets the secret password to Cisco? enable secret cisco enable password Cisco enable secret Cisco enable secret password Cisco enable secret cisco enable password Cisco enable secret Cisco enable secret password Cisco ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? Token-Ring Server-based Star Peer-to-peer Ethernet Token-Ring Server-based Star Peer-to-peer Ethernet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are two purposes for segmentation with a bridge?1. To add more broadcast domains.2. To create more collision domains.3. To add more bandwidth for users.4. To allow more broadcasts for users. 2 and 3 1 only 4 only 2 and 4 2 and 3 1 only 4 only 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use TCP?1. DHCP2. SMTP3. HTTP4. TFTP5. FTP 1, 3 and 4 2, 3 and 5 1, 2 and 4 1 and 2 1, 3 and 4 2, 3 and 5 1, 2 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many Character per sec(7bits + 1parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 "Start" and 1 "stop" bit)? 300 275 240 250 300 275 240 250 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? During high-traffic periods After broken links are reestablished When upper-layer protocols require high reliability In an improperly implemented redundant topology During high-traffic periods After broken links are reestablished When upper-layer protocols require high reliability In an improperly implemented redundant topology ANSWER DOWNLOAD EXAMIANS APP