Computer Networking Which protocol does Ping use? TCP ARP BootP ICMP TCP ARP BootP ICMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase nvram erase running erase startup delete nvram erase nvram erase running erase startup delete nvram ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The CCITT Recommendation X.25 specifies three layers of communications: datalink, network and transport None of these Session, transport and network physical datalink and network application, presentation and session datalink, network and transport None of these Session, transport and network physical datalink and network application, presentation and session ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver can do one way data transmission only cannot talk at once can send or receive data one at a time None of these can receive and send data simultaneously can do one way data transmission only cannot talk at once can send or receive data one at a time None of these can receive and send data simultaneously ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you want to disable STP on a port connected to a server, which command would you use? spanning-tree off spanning-tree portfast disable spanning-tree spanning-tree security spanning-tree off spanning-tree portfast disable spanning-tree spanning-tree security ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Two Three Five Six Four Two Three Five Six Four ANSWER DOWNLOAD EXAMIANS APP