Computer Networking
The most flexibility in how devices are wired together is provided by

None of these
bus networks
ring networks
star networks
T-switched networks

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

None of these
All of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
a technique used in best-effort delivery systems to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.136.0 0.0.15.255
access-list 10 deny 172.16.144.0 0.0.7.255
access-list 10 deny 172.16.48.0 255.255.240.0

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?1. A crossover cable should be used in place of the straight-through cable.2. A rollover cable should be used in place of the straight-through cable.3. The subnet masks should be set to 255.255.255.192.4. A default gateway needs to be set on each host.5. The subnet masks should be set to 255.255.255.0.

2 and 5 only
1 only
2 only
1 and 5 only
3 and 4 only

ANSWER DOWNLOAD EXAMIANS APP