Computer Networking Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server? X.25 None of these RIP RARP RDP X.25 None of these RIP RARP RDP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use TCP?1. DHCP2. SMTP3. HTTP4. TFTP5. FTP 1, 2 and 4 1, 3 and 4 1 and 2 2, 3 and 5 1, 2 and 4 1, 3 and 4 1 and 2 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server? 10 Mbps 2 Mbps 100 kbps 1 Mbps 10 Mbps 2 Mbps 100 kbps 1 Mbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode. 2 and 4 5 only 1, 2, and 5 2, 3 and 4 2 and 4 5 only 1, 2, and 5 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP