Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is a layer 2 protocol used to maintain a loop-free network? RIP CDP STP VTP RIP CDP STP VTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error control is needed at the transport layer because of potential errors occurring _____. from transmission line noise from out-of-sequence delivery from packet losses. in routers from transmission line noise from out-of-sequence delivery from packet losses. in routers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When using the loopback address, if TCP/IP is installed correctly, when should you receive a response? Immediately Within two minutes None of these After the next host comes online Only if the address fails Immediately Within two minutes None of these After the next host comes online Only if the address fails ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? SMTP SNMP DHCP ARP SMTP SNMP DHCP ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? to determine the flow of data None of these to determine the type of switching used in a data link. to detect problems in protocols to determine the type of transmission used in a data link to determine the flow of data None of these to determine the type of switching used in a data link. to detect problems in protocols to determine the type of transmission used in a data link ANSWER DOWNLOAD EXAMIANS APP