Computer Networking
The most flexibility in how devices are wired together is provided by

ring networks
bus networks
None of these
T-switched networks
star networks

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true when describing a unicast address?

These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
These are like private addresses in IPv4 in that they are not meant to be routed.
These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Packets addressed to a unicast address are delivered to a single interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

All of these
the method of determining which device has access to the transmission medium at any time.
a form of TDMA in which circuit switching is used to dynamically change the channel assignments
a medium access control technique for multiple access transmission media
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is route poisoning?

It prevents regular update messages from reinstating a route that has just come up.
It describes when a router sets the metric for a downed link to infinity.
It is information received from a router that can't be sent back to the originating router.
It sends back the protocol received from a router as a poison pill, which stops the regular updates.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?

255.224.0.0
255.248.0.0
255.254.0.0
255.240.0.0
255.252.0.0

ANSWER DOWNLOAD EXAMIANS APP