Computer Networking Which of the following medium access control technique is used for bus/tree? token ring CSMA token bus MAC None of these token ring CSMA token bus MAC None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following medium is used for broadband local networks? optic fiber Coaxial cable CATV None of these UTP optic fiber Coaxial cable CATV None of these UTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer 4 protocol is used for a Telnet connection? IP UDP TCP/IP TCP IP UDP TCP/IP TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.240.0 255.255.224.0 255.255.252.0 255.255.192.0 255,255.248.0 255.255.240.0 255.255.224.0 255.255.252.0 255.255.192.0 255,255.248.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 3, 4 and 5 1 and 2 1, 3 and 4 2, 3 and 5 3, 4 and 5 1 and 2 1, 3 and 4 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP