Computer Networking Which of the following is not a disadvantage of wireless LAN? Slower data transmission higher error rate interference of transmissions from different computers All of these Slower data transmission higher error rate interference of transmissions from different computers All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To provide a mechanism for network monitoring in switched environments To prevent routing loops in networks with redundant paths To create collision domains To manage the VLAN database across multiple switches To prevent switching loops in networks with redundant switched paths To provide a mechanism for network monitoring in switched environments To prevent routing loops in networks with redundant paths To create collision domains To manage the VLAN database across multiple switches To prevent switching loops in networks with redundant switched paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With which network type will OSPF establish router adjacencies but not perform the DR/BDR election process? Broadcast multi-access IS-IS Non-broadcast multi-access Backbone area 0 Point-to-point Broadcast multi-access IS-IS Non-broadcast multi-access Backbone area 0 Point-to-point ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following types of connections can use full duplex?1. Hub to hub2. Switch to switch3. Host to host4. Switch to hub5. Switch to host 3 and 5 1, 2 and 4 3 and 4 2, 3 and 5 3 and 5 1, 2 and 4 3 and 4 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? BootP ICMP ARP TCP BootP ICMP ARP TCP ANSWER DOWNLOAD EXAMIANS APP