Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 4 2 5 3 4 2 5 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following program is used to copy files to or from another UNIX timesharing system over a single link? TFTP None of these UART UUCP VMTP TFTP None of these UART UUCP VMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets? 255.255.255. 240 255.255.255.192 255.255.255.224 255.255.255.252 255.255.255.248 255.255.255. 240 255.255.255.192 255.255.255.224 255.255.255.252 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 1, 3 and 4 1 and 2 3 only 2 only 1, 3 and 4 1 and 2 3 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? prefix-length no mask block-size / (slash notation) prefix-length no mask block-size / (slash notation) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking One important characteristic of the hub architecture of ARC-net is access control and addressing None of these directionalized transmission alternative routing multiple virtual networks access control and addressing None of these directionalized transmission alternative routing multiple virtual networks ANSWER DOWNLOAD EXAMIANS APP