Computer Networking Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size? 8 4 16 None of these 15 8 4 16 None of these 15 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The loss in signal power as light travels down the fiber is called attenuation interruption scattering propagation None of these attenuation interruption scattering propagation None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The network layer, in reference to the OSI model, provide the virtual circuit interface to packet-switched service All of these data link procedures that provide for the exchange of data via frames that can be sent and received None of these the interface between the X.25 network and packet mode device the virtual circuit interface to packet-switched service All of these data link procedures that provide for the exchange of data via frames that can be sent and received None of these the interface between the X.25 network and packet mode device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To manage the VLAN database across multiple switches To create collision domains To provide a mechanism for network monitoring in switched environments To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To manage the VLAN database across multiple switches To create collision domains To provide a mechanism for network monitoring in switched environments ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will display the CHAP authentication process as it occurs between two routers in the network? debug chap authentication show interface serial 0 show chap authentication debug ppp authentication debug chap authentication show interface serial 0 show chap authentication debug ppp authentication ANSWER DOWNLOAD EXAMIANS APP