Computer Networking Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model? Cable xDSL VPN HDLC IPSec Cable xDSL VPN HDLC IPSec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? 240 248 224 192 252 240 248 224 192 252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The term "remote job entry" relates to None of these distributed processing transaction processing batch processing realtime processing None of these distributed processing transaction processing batch processing realtime processing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The topology with highest reliability is: Mesh topology Bus topology Ring topology Star topology Mesh topology Bus topology Ring topology Star topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 4 only 3 and 4 1 and 2 1 only 4 only 3 and 4 1 and 2 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following summation operation is performed on the bits to check an error-detecting code? Attenuation None of these Checksum Coder-decoder Codec Attenuation None of these Checksum Coder-decoder Codec ANSWER DOWNLOAD EXAMIANS APP