Computer Networking Which utility is an all-purpose tool for troubleshooting TCP/IP problems? Netstat PING Hostname None of these NBTSTAT Netstat PING Hostname None of these NBTSTAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 3 and 4 1 only 1 and 2 4 only 3 and 4 1 only 1 and 2 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type show running-config and get this output:[output cut]Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login[output cut]What do the two numbers following the exec-timeout command mean? If no command has been typed in 35 seconds, the console connection will be closed. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no command has been typed in 35 seconds, the console connection will be closed. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a block of data during transmission None of these two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a block of data during transmission None of these two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What VTP mode allows you to change VLAN information on the switch? Transparent Server STP Client Transparent Server STP Client ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) ANSWER DOWNLOAD EXAMIANS APP