Computer Networking
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

None of these
Layer 6 protocols
Layer 5 protocols
Layer 7 protocols
Layer 4 protocols

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Ethernet, because it is cabled using fiber-optic cable
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Token-Ring, because it uses a MAU

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
An encyclopedic database

is easy for beginners to use
All of these
is generally free
is an information utility that specializes in storing and searching information
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
ICMP (Internet Control Message Protocol) is

a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
a TCP/IP high level protocol for transferring files from one machine to another
a protocol used to monitor computers
None of these
a protocol that handles error and control messages

ANSWER DOWNLOAD EXAMIANS APP