Computer Networking Which of the following signals is not standard RS - 232-C signal? DSR CTS VDR None of these RTS DSR CTS VDR None of these RTS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are two purposes for segmentation with a bridge?1. To add more broadcast domains.2. To create more collision domains.3. To add more bandwidth for users.4. To allow more broadcasts for users. 2 and 3 1 only 4 only 2 and 4 2 and 3 1 only 4 only 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 2 Layer 4 Layer 3 Layer 7 Layer 2 Layer 4 Layer 3 Layer 7 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Aloha Amplitude-shift keying Amplitude None of these Amplitude modulation Aloha Amplitude-shift keying Amplitude None of these Amplitude modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? 252 224 248 240 192 252 224 248 240 192 ANSWER DOWNLOAD EXAMIANS APP