Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 5 4 2 3 5 4 2 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer: Open Systems Internetwork processor TCP/IP Protocol None of these Open Systems Internetwork processor TCP/IP Protocol None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the process identifier that is used to run OSPF on a router?1. It is locally significant.2. It is globally significant.3. It is needed to identify a unique instance of an OSPF database.4. It is an optional parameter required only if multiple OSPF processes are running on the router. 3 and 5 All of these 1 and 3 1, 2 and 4 IS-IS 3 and 5 All of these 1 and 3 1, 2 and 4 IS-IS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In geosynchronous orbit, satellite moves simultaneously moves faster than the earth's rotation so that it can cover larger portion of earth. remains in a fixed position so that as earth rotates, it can fully cover the earth None of these remains in a fixed position related to points on earth moves simultaneously moves faster than the earth's rotation so that it can cover larger portion of earth. remains in a fixed position so that as earth rotates, it can fully cover the earth None of these remains in a fixed position related to points on earth ANSWER DOWNLOAD EXAMIANS APP