Computer Networking If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link? RouterA (config) #bandwidth 64 RouterA (config-if) #bandwidth 64000 RouterA (config-if) #clock rate 64 RouterA (config-if) #clock rate 64000 RouterA (config) #bandwidth 64 RouterA (config-if) #bandwidth 64000 RouterA (config-if) #clock rate 64 RouterA (config-if) #clock rate 64000 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many non-overlapping channels are available with 802.11a? 40 12 3 23 40 12 3 23 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.224 255.255.255.248 255.255.255.240 255.255.255.255 255.255.255.192 255.255.255.224 255.255.255.248 255.255.255.240 255.255.255.255 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 1 and 2 2 and 4 3 and 4 1 and 3 1 and 2 2 and 4 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error detecting code Checksum None of these Error rate Cyclic redundancy check Error detecting code Checksum None of these Error rate Cyclic redundancy check ANSWER DOWNLOAD EXAMIANS APP