Computer Networking Which of the following is a layer 2 protocol used to maintain a loop-free network? VTP CDP RIP STP VTP CDP RIP STP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? burst multiple-bit recoverable single-bit burst multiple-bit recoverable single-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use? 255.240.0.0 255.224.0.0 255.248.0.0 255.252.0.0 255.254.0.0 255.240.0.0 255.224.0.0 255.248.0.0 255.252.0.0 255.254.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A data communications system has: 6 components 7 components 5 components 4 components 6 components 7 components 5 components 4 components ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When you ping the loopback address, a packet is sent where? On the network Across the wire None of these Down through the layers of the IP architecture and then up the layers again through the loopback dongle On the network Across the wire None of these Down through the layers of the IP architecture and then up the layers again through the loopback dongle ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use TCP?1. DHCP2. SMTP3. HTTP4. TFTP5. FTP 1 and 2 1, 2 and 4 2, 3 and 5 1, 3 and 4 1 and 2 1, 2 and 4 2, 3 and 5 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP