Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: spider network data control network ring network hierarchical network None of these spider network data control network ring network hierarchical network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a synchronous modem, the receive equalizer is known as compromise equalizer impairment equalizer None of these statistical equalizer adaptive equalizer compromise equalizer impairment equalizer None of these statistical equalizer adaptive equalizer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type the following command into the router and receive the following output:Router#show serial 0/0 ^% Invalid input detected at '^' marker.Why was this error message displayed? You need to be in privileged mode. You cannot have a space between serial and 0/0. Part of the command is missing. The router does not have a serial0/0 interface. You need to be in privileged mode. You cannot have a space between serial and 0/0. Part of the command is missing. The router does not have a serial0/0 interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Establishing a virtual connection is functionally equivalent to Physically connecting a DTE and DCE None of these Placing a modem prior to a conversation Connecting as virtual memory Placing a telephone call prior to a conversation Physically connecting a DTE and DCE None of these Placing a modem prior to a conversation Connecting as virtual memory Placing a telephone call prior to a conversation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?1. show version2. show protocols3. show interfaces4. show controllers5. show ip interface 3 and 4 only None of these 2, 3 and 5 1, 2 and 4 3 and 4 only None of these 2, 3 and 5 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 ANSWER DOWNLOAD EXAMIANS APP