Computer Networking Transmission of computerised data from one location to another is called data flow data management None of these data communication data transfer data flow data management None of these data communication data transfer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A medium access control technique for multiple access transmission media is Amplitude None of these Attenuation Aloha Angle modulation Amplitude None of these Attenuation Aloha Angle modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? config mem wr mem copy running backup copy running-config startup-config config mem wr mem copy running backup copy running-config startup-config ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two of the following commands will place network 10.2.3.0/24 into area 0?1. router eigrp 102. router ospf 103. network 10.0.0.04. network 10.2.3.0 0.0.0.255 area05. network 10.2.3.0 0.0.0.255 area 0 2 and 5 3 and 4 2, 4, and 5 1 and 4 2 and 5 3 and 4 2, 4, and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are TCP/IP protocols used at the Application layer of the OSI model?1. IP2. TCP3. Telnet4. FTP5. TFTP All of these 1, 3 and 5 1 and 3 3, 4 and 5 All of these 1, 3 and 5 1 and 3 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP