Computer Networking Which of the following connectivity devices is used to extend a network on a purely mechanical basis? Switch Gateway 802.6 Router Active hub Switch Gateway 802.6 Router Active hub ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A characteristic of a multiprogramming system is: None of these All listed here simultaneous execution of program instructions from two applications multiple CPUs concurrent processing of two or more programs None of these All listed here simultaneous execution of program instructions from two applications multiple CPUs concurrent processing of two or more programs ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Your company is running IGRP using an AS of 10. You want to configure EIGRP on the network but want to migrate slowly to EIGRP and don't want to configure redistribution. What command would allow you to migrate over time to EIGRP without configuring redistribution? router eigrp 11 router eigrp 10 redistribute igrp router igrp combine eigrp 10 router eigrp 10 router eigrp 11 router eigrp 10 redistribute igrp router igrp combine eigrp 10 router eigrp 10 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking X.21 is a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued by ISO network access standard for connecting stations to a circuit-switched network None of these a method access control technique for multiple-access transmission media a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued by ISO network access standard for connecting stations to a circuit-switched network None of these a method access control technique for multiple-access transmission media ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. ANSWER DOWNLOAD EXAMIANS APP