Computer Networking Which of the following medium access control technique is used for bus/tree? CSMA None of these token ring MAC token bus CSMA None of these token ring MAC token bus ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____. 3, 2, 1, none All of these 3, 3, 1, 7 3, 2, 1, 7 3, 3, 2, none 3, 2, 1, none All of these 3, 3, 1, 7 3, 2, 1, 7 3, 3, 2, none ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet 1 and 4 1, 2 and 3 All of these 3, 4, and 5 1 and 4 1, 2 and 3 All of these 3, 4, and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command is used to determine if an IP access list is enabled on a particular interface? show ip interface show access-lists show interface access-lists show interface show ip interface show access-lists show interface access-lists show interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 7 protocols None of these Layer 5 protocols Layer 4 protocols Layer 6 protocols Layer 7 protocols None of these Layer 5 protocols Layer 4 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The slowest transmission speeds are those of coaxial cable microwaves twisted-pair wire fiber-optic cable coaxial cable microwaves twisted-pair wire fiber-optic cable ANSWER DOWNLOAD EXAMIANS APP