Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 7 protocols Layer 6 protocols None of these Layer 5 protocols Layer 4 protocols Layer 7 protocols Layer 6 protocols None of these Layer 5 protocols Layer 4 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement(s) about IPv4 and IPv6 addresses are true? 1. An IPv6 address is 32 bits long, represented in hexidecimal. 2. An IPv6 address is 128 bits long, represented in decimal. 3. An IPv4 address is 32 bits long, represented in decimal. 4. An IPv6 address is 128 bits long, represented in hexidecimal. 2 only 2 and 4 3 and 4 1 and 3 only 2 only 2 and 4 3 and 4 1 and 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The ________ measures the number of lost or garbled messages as a fraction of the total sent in the sampling period. Connection release failure probability. Residual Error Rate. Connection establish. Transfer Failure Probability. Connection release failure probability. Residual Error Rate. Connection establish. Transfer Failure Probability. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Add the destination to the MAC address table and then forward the frame Flood the network with the frame Add the source address and port to the MAC address table and forward the frame out the destination port Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Flood the network with the frame Add the source address and port to the MAC address table and forward the frame out the destination port Discard it and send an error message back to the originating host ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transmission signal coding method of TI carrier is called None of these Manchester Binary Bipolar NRZ None of these Manchester Binary Bipolar NRZ ANSWER DOWNLOAD EXAMIANS APP