Computer Networking Error detection at the data link level is achieved by Bit Stuffing Hamming Code Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization Cyclic Redundancy Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a multicast address? Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. Packets addressed to a unicast address are delivered to a single interface. Identifies multiple interfaces and is only delivered to one address. This address can also be called one-to-one-of-many. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. Packets addressed to a unicast address are delivered to a single interface. Identifies multiple interfaces and is only delivered to one address. This address can also be called one-to-one-of-many. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding VLANs? You should not have more than 10 switches in the same VTP domain. VTP is used to send VLAN information to switches in a configured VTP domain. You must have at least two VLANs defined in every Cisco switched network. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. You should not have more than 10 switches in the same VTP domain. VTP is used to send VLAN information to switches in a configured VTP domain. You must have at least two VLANs defined in every Cisco switched network. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet All of these 3, 4, and 5 1, 2 and 3 1 and 4 All of these 3, 4, and 5 1, 2 and 3 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? X.25 UDP VMTP None of these SMTP X.25 UDP VMTP None of these SMTP ANSWER DOWNLOAD EXAMIANS APP