Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? TCP BootP ARP ICMP TCP BootP ARP ICMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How much power (roughly) a light-emitting diode can couple into an optical fiber? 440 microwatts None of these 100 picowatts 100 microwatts 10 milliwatts 440 microwatts None of these 100 picowatts 100 microwatts 10 milliwatts ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select correct type of line configuration: Link Single point Multi-point Dedicated point Link Single point Multi-point Dedicated point ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice? CSMA/CD Ethernet CSMA/CA Token-Ring ARCnet CSMA/CD Ethernet CSMA/CA Token-Ring ARCnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? Keyboard None of these Modem Fax Scanner Keyboard None of these Modem Fax Scanner ANSWER DOWNLOAD EXAMIANS APP