Computer Networking The topology with highest reliability is: Bus topology Star topology Mesh topology Ring topology Bus topology Star topology Mesh topology Ring topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following medium access control technique is used for bus/tree? CSMA token bus None of these token ring MAC CSMA token bus None of these token ring MAC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 1,2 and 3 2 only 4 only 1 and 4 1,2 and 3 2 only 4 only 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The basic Ethernet design does not provide addressing None of these multiple virtual networks access control automatic retransmission of a message addressing None of these multiple virtual networks access control automatic retransmission of a message ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A data communications system has: 6 components 7 components 5 components 4 components 6 components 7 components 5 components 4 components ANSWER DOWNLOAD EXAMIANS APP