Computer Networking Which of the following medium is used for broadband local networks? CATV None of these UTP Coaxial cable optic fiber CATV None of these UTP Coaxial cable optic fiber ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 4 Layer 7 Layer 2 Layer 3 Layer 4 Layer 7 Layer 2 Layer 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Token-Ring, because it uses a MAU Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Token-Ring, because it uses a MAU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose? Error detecting protocols Telecommunications None of these Communications software Link access procedure (LAP) Error detecting protocols Telecommunications None of these Communications software Link access procedure (LAP) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 4 and 5 1 and 3 2, 3 and 5 2 and 4 4 and 5 1 and 3 2, 3 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer: Protocol None of these Open Systems Internetwork processor TCP/IP Protocol None of these Open Systems Internetwork processor TCP/IP ANSWER DOWNLOAD EXAMIANS APP