Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? xDSL Cable IPSec VPN HDLC xDSL Cable IPSec VPN HDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error-detecting code inserted as a field in a block of data to be transmitted is known as Frame check sequence Error detecting code Checksum None of these flow control Frame check sequence Error detecting code Checksum None of these flow control ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following best illustrates the default subnet mask for a class A,B, and C Network? 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 0.0.0.0, 0.0.0.1, 0.0.1.1 255.0.0.0, 255.255.0.0, 255.255.255.0 None of these 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 0.0.0.0, 0.0.0.1, 0.0.1.1 255.0.0.0, 255.255.0.0, 255.255.255.0 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many hosts are available at each site with a subnet mask of 248? 16,382 1,022 2,046 4,094 8,190 16,382 1,022 2,046 4,094 8,190 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following summation operation is performed on the bits to check an error-detecting code? Attenuation None of these Coder-decoder Codec Checksum Attenuation None of these Coder-decoder Codec Checksum ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A terminal multiplexer has six 1200 bps terminals and 'n' 300bps terminals connected to it. The outgoing line is 9600bps. What is the maximum value of n? 8 4 28 16 8 4 28 16 ANSWER DOWNLOAD EXAMIANS APP