Computer Networking Which of the following digits are known as the terminal number of the Network User Address (NUA)? 13-14 05-Jul 08-Dec 01-Apr None of these 13-14 05-Jul 08-Dec 01-Apr None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 1, 3 and 5 3 and 5 2, 4 and 6 2 and 6 1, 3 and 5 3 and 5 2, 4 and 6 2 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A front-end processor is a processor in a large-scale computer that executes operating system instructions a user computer system None of these preliminary processor of batch jobs. a minicomputer that relieves main-frame computers at a computer centre of communications control functions a processor in a large-scale computer that executes operating system instructions a user computer system None of these preliminary processor of batch jobs. a minicomputer that relieves main-frame computers at a computer centre of communications control functions ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What can cause a problem with communication with a client by name but not by IP address? The IP address Static files such as an LMHOSTS file or a DNS database Subnet mask The default gateway None of these The IP address Static files such as an LMHOSTS file or a DNS database Subnet mask The default gateway None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class B network? 127.0.01 255.255.0.0 255.255.255.0 255.0.0.0 None of these 127.0.01 255.255.0.0 255.255.255.0 255.0.0.0 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. ANSWER DOWNLOAD EXAMIANS APP