Computer Networking To avoid transmission errors, a check figure is calculated by the receiving computer None of these Start and stop bit both A and B transmitting computer receiving computer None of these Start and stop bit both A and B transmitting computer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Time required for a message to travel from one device to another is known as: Response time Transit time Dialogue time Wait time Response time Transit time Dialogue time Wait time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command would you use to apply an access list to a router interface? access-list ip 101 in ip access-group 101 in ip access-list 101 out access-group ip 101 in access-list ip 101 in ip access-group 101 in ip access-list 101 out access-group ip 101 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 1, 3 and 4 1 and 2 3 only 2 only 1, 3 and 4 1 and 2 3 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol does Ping use? ARP TCP ICMP BootP ARP TCP ICMP BootP ANSWER DOWNLOAD EXAMIANS APP