Computer Networking Which of the following summation operation is performed on the bits to check an error-detecting code? Codec None of these Checksum Attenuation Coder-decoder Codec None of these Checksum Attenuation Coder-decoder ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the None of these receiving computer transmitting computer Start and stop bit both A and B None of these receiving computer transmitting computer Start and stop bit both A and B ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer 4 protocol is used for a Telnet connection? IP UDP TCP/IP TCP IP UDP TCP/IP TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk on switchport mode trunk switchport trunk on trunk all trunk on switchport mode trunk switchport trunk on trunk all ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A physical address that is assigned by the manufacturer The logical domain address for the workstation A physical address that is randomly assigned each time the computer is started An alias for the computer name A logical address that identifies the workstation A physical address that is assigned by the manufacturer The logical domain address for the workstation A physical address that is randomly assigned each time the computer is started An alias for the computer name A logical address that identifies the workstation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 1 and 4 2 and 4 1, 4 and 6 3 and 5 1 and 4 2 and 4 1, 4 and 6 3 and 5 ANSWER DOWNLOAD EXAMIANS APP