Computer Networking You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue? Router> ping Router> show interface Router> show ip route Router> trace Router> ping Router> show interface Router> show ip route Router> trace ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring files from one machine to another? None of these TCP FTP ARP RARP None of these TCP FTP ARP RARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is separated by a subnet mask? DHCP scopes Network ID and host ID Subnets None of these Domains DHCP scopes Network ID and host ID Subnets None of these Domains ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: None of these modulation demodulation synchronizing synchronizing None of these modulation demodulation synchronizing synchronizing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? Host-to-Host Internet Network Access Application Host-to-Host Internet Network Access Application ANSWER DOWNLOAD EXAMIANS APP