Computer Networking In a network with dozens of switches, how many root bridges would you have? 1 5 2 12 1 5 2 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 30 14 15 16 30 14 15 16 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 3 and 4 1 only 4 only 1 and 2 3 and 4 1 only 4 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? The update will be ignored and no further action will occur. They will all load-balance. The updated information will replace the existing routing table entry. The updated information will be added to the existing routing table. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The update will be ignored and no further action will occur. They will all load-balance. The updated information will replace the existing routing table entry. The updated information will be added to the existing routing table. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A medium access control technique for multiple access transmission media is Attenuation Angle modulation None of these Amplitude Aloha Attenuation Angle modulation None of these Amplitude Aloha ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So different networks could communicate. So application developers can change only one layer's protocols at a time. So Cisco could use the model. To create a layered model larger than the DoD model. So different networks could communicate. So application developers can change only one layer's protocols at a time. So Cisco could use the model. To create a layered model larger than the DoD model. ANSWER DOWNLOAD EXAMIANS APP