Computer Networking Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz? G B N A G B N A ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used between E-Mail servers? POP3 None of these FTP SMTP SNMP POP3 None of these FTP SMTP SNMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does 224 translate to in binary? None of these 11110000 11110 11100000 1111 None of these 11110000 11110 11100000 1111 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The CCITT Recommendation X.25 specifies three layers of communications: None of these physical datalink and network Session, transport and network datalink, network and transport application, presentation and session None of these physical datalink and network Session, transport and network datalink, network and transport application, presentation and session ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?Corp#sh ip route[output cut]R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0C 192.168.20.0 is directly connected, Serial0/0C 192.168.214.0 is directly connected, FastEthernet0/0 The router will broadcast looking for the destination. The packet will be routed out the Fa0/0 interface. They will all load-balance. The packet will be discarded. The packet will be routed out the S0/0 interface. The router will broadcast looking for the destination. The packet will be routed out the Fa0/0 interface. They will all load-balance. The packet will be discarded. The packet will be routed out the S0/0 interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 3, 4 and 5 1 and 4 2 and 3 1 and 3 3, 4 and 5 1 and 4 2 and 3 1 and 3 ANSWER DOWNLOAD EXAMIANS APP