Computer Networking Which of the following commands sets the secret password to Cisco? enable secret cisco enable secret Cisco enable password Cisco enable secret password Cisco enable secret cisco enable secret Cisco enable password Cisco enable secret password Cisco ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the data transmission channels available for carrying data from one location to another? Voiceband None of these Broadband Narrowband All of these Voiceband None of these Broadband Narrowband All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use? 255.255.255.224 255.255.255.240 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.224 255.255.255.240 255.255.255.192 255.255.255.252 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When the computer provides the manager with a multiple choice of possible answers, the prompting technique is question and answer form filling menu selection None of these open-ended question question and answer form filling menu selection None of these open-ended question ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Switching at the network layer in the Internet uses the datagram approach to: Circuit switching IP switching Message switching Packet switching Circuit switching IP switching Message switching Packet switching ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Synchronous protocols are generally used by personal computers transmit characters one at a time None of these are more reliable allow faster transmission than asynchronous protocols do are generally used by personal computers transmit characters one at a time None of these are more reliable allow faster transmission than asynchronous protocols do ANSWER DOWNLOAD EXAMIANS APP