Computer Networking The loss in signal power as light travels down the fiber is called attenuation propagation interruption None of these scattering attenuation propagation interruption None of these scattering ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Flood the network with the frame Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Discard it and send an error message back to the originating host Flood the network with the frame Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Discard it and send an error message back to the originating host ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error-detecting code inserted as a field in a block of data to be transmitted is known as Checksum Error detecting code flow control Frame check sequence None of these Checksum Error detecting code flow control Frame check sequence None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? Duplexing Modem options None of these Protocol Handshaking Duplexing Modem options None of these Protocol Handshaking ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes? Five Two Six Four Three Five Two Six Four Three ANSWER DOWNLOAD EXAMIANS APP