Computer Networking Which utility is useful for finding the local host name? NBTSTAT PING Hostname None of these Netstat NBTSTAT PING Hostname None of these Netstat ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the destination host after translation? Inside local Inside global Outside local Outside global Inside local Inside global Outside local Outside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does the command routerA (config) #line cons 0 allow you to perform next? Set your console password. Disable console connections. Set the Telnet password. Shut down the router. Set your console password. Disable console connections. Set the Telnet password. Shut down the router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which file transfer protocol uses UDP? NFS TELNET TFTP FTP None of these NFS TELNET TFTP FTP None of these ANSWER DOWNLOAD EXAMIANS APP