Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? BootP ARP TCP ICMP BootP ARP TCP ICMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: ring network spider network hierarchical network None of these data control network ring network spider network hierarchical network None of these data control network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Videotex is a combination of computer technology communication None of these All of these television computer technology communication None of these All of these television ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM? None of these Frequency modulation Amplitude modulation Frequency-division multiple access Frequency-shift keying None of these Frequency modulation Amplitude modulation Frequency-division multiple access Frequency-shift keying ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: OSI Network Server Network operating system Virtual Private Network OSI Network Server Network operating system Virtual Private Network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? 224 192 240 252 248 224 192 240 252 248 ANSWER DOWNLOAD EXAMIANS APP