Computer Networking Which of the following TCP/IP protocol is used for transferring files from one machine to another? RARP None of these TCP FTP ARP RARP None of these TCP FTP ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system? Security procedure Identification procedure Safeguard procedure Log-on procedure None of these Security procedure Identification procedure Safeguard procedure Log-on procedure None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer: TCP/IP Internetwork processor Open Systems Protocol TCP/IP Internetwork processor Open Systems Protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following best illustrates the default subnet mask for a class A,B, and C Network? 255.0.0.0, 255.255.0.0, 255.255.255.0 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 None of these 0.0.0.0, 0.0.0.1, 0.0.1.1 255.0.0.0, 255.255.0.0, 255.255.255.0 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 None of these 0.0.0.0, 0.0.0.1, 0.0.1.1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following encapsulates PPP frames in Ethernet frames and uses common PPP features like authentication, encryption, and compression? PPP PPPoE Token Ring PPPoA PPP PPPoE Token Ring PPPoA ANSWER DOWNLOAD EXAMIANS APP