Computer Networking Which of the following is used for modulation and demodulation? protocols modem None of these multiplexer gateway protocols modem None of these multiplexer gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In OSI network architecture, the dialogue control and token management are responsibilities of transport layer None of these session layer data link layer network layer transport layer None of these session layer data link layer network layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network types have a designated router and a backup designated router assigned? 1. Broadcast 2. Point-to-point 3. NBMA 4. NBMA point-to-point 1 and 3 All of these 1, 2 and 3 3 and 4 1 and 3 All of these 1, 2 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Communication network is the condition with two or more stations attempt to use the same channel at the same time None of these one or more conductors that serve as a common connection for a related group of devices a continuous frequency capable of being modulated or impressed with a second signal a collection of interconnected functional units that provides a data communications service among stations attached to the network the condition with two or more stations attempt to use the same channel at the same time None of these one or more conductors that serve as a common connection for a related group of devices a continuous frequency capable of being modulated or impressed with a second signal a collection of interconnected functional units that provides a data communications service among stations attached to the network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following series of commands will restrict Telnet access to the router? Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology? Modified ring Ring Linear bus Modified star Hybrid hub Modified ring Ring Linear bus Modified star Hybrid hub ANSWER DOWNLOAD EXAMIANS APP