Computer Networking Which of the following is required to communicate between two computers? communications hardware protocol access to transmission medium All of these communications software communications hardware protocol access to transmission medium All of these communications software ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A front-end processor is a processor in a large-scale computer that executes operating system instructions preliminary processor of batch jobs. a user computer system None of these a minicomputer that relieves main-frame computers at a computer centre of communications control functions a processor in a large-scale computer that executes operating system instructions preliminary processor of batch jobs. a user computer system None of these a minicomputer that relieves main-frame computers at a computer centre of communications control functions ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The configuration register setting of 0x2102 provides what function to a router? Tells the router to boot into ROM monitor mode Tells the router to look in NVRAM for the boot sequence Provides password recovery Boots the IOS from a TFTP server Tells the router to boot into ROM monitor mode Tells the router to look in NVRAM for the boot sequence Provides password recovery Boots the IOS from a TFTP server ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The term "remote job entry" relates to transaction processing realtime processing distributed processing batch processing None of these transaction processing realtime processing distributed processing batch processing None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 2 and 4 4 and 5 1 and 3 2, 3 and 5 2 and 4 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question. 192.168.10.126 192.168.10.142 192.168.10.143 192.168.10.66 192.168.100.254 192.168.10.126 192.168.10.142 192.168.10.143 192.168.10.66 192.168.100.254 ANSWER DOWNLOAD EXAMIANS APP