Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? None of these FTP RPC SMTP SNMP None of these FTP RPC SMTP SNMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model? Cable xDSL VPN IPSec HDLC Cable xDSL VPN IPSec HDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 3 Layer 4 Layer 2 Layer 7 Layer 3 Layer 4 Layer 2 Layer 7 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select? Ethernet Bus Right Token-Ring Star Ethernet Bus Right Token-Ring Star ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the illustration from the previous question, what would be the IP address of SO if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question. 192.168.10.62 192.168.10.24 192.168.10.30 192.168.10.127 192.168.10.62 192.168.10.24 192.168.10.30 192.168.10.127 ANSWER DOWNLOAD EXAMIANS APP