Computer Networking Which of the following files is used for NetBIOS name resolution? FQDN None of these HOSTS LMHOSTS ARP FQDN None of these HOSTS LMHOSTS ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?1. A crossover cable should be used in place of the straight-through cable.2. A rollover cable should be used in place of the straight-through cable.3. The subnet masks should be set to 255.255.255.192.4. A default gateway needs to be set on each host.5. The subnet masks should be set to 255.255.255.0. 2 and 5 only 3 and 4 only 2 only 1 and 5 only 1 only 2 and 5 only 3 and 4 only 2 only 1 and 5 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking ASK, PSK, FSK, and QAM are examples of _____ encoding. analog-to-analog None of these digital-to-analog digital-to-digital analog-to-digital analog-to-analog None of these digital-to-analog digital-to-digital analog-to-digital ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates? Router (config-if) # passive-interface Router (config-router) # no routing updates Router (config-router) # passive-interface s0 Router (config-if) # no routing Router (config-if) # passive-interface Router (config-router) # no routing updates Router (config-router) # passive-interface s0 Router (config-if) # no routing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets? 255.255.255.252 255.255.255.248 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.252 255.255.255.248 255.255.255.192 255.255.255.240 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Bit Stuffing Cyclic Redundancy Code Hamming Code Equalization Bit Stuffing Cyclic Redundancy Code Hamming Code Equalization ANSWER DOWNLOAD EXAMIANS APP