Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? FTP SMTP None of these SNMP RPC FTP SMTP None of these SNMP RPC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. Repeaters cannot increase the signal strength sufficiently "Line echo" occurs due to the impedance of the cable Cable terminators do not reflect the signal properly Network collisions occur Cable terminators do not absorb the signal properly Repeaters cannot increase the signal strength sufficiently "Line echo" occurs due to the impedance of the cable Cable terminators do not reflect the signal properly Network collisions occur Cable terminators do not absorb the signal properly ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 2 only 4 only 1,2 and 3 1 and 4 2 only 4 only 1,2 and 3 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 2 and 4 1, 4 and 6 3 and 5 1 and 4 2 and 4 1, 4 and 6 3 and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To create collision domains To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To create collision domains To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths ANSWER DOWNLOAD EXAMIANS APP