Computer Networking You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use? 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.252 255.255.255.248 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.252 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A logical address that identifies the workstation A physical address that is assigned by the manufacturer The logical domain address for the workstation An alias for the computer name A physical address that is randomly assigned each time the computer is started A logical address that identifies the workstation A physical address that is assigned by the manufacturer The logical domain address for the workstation An alias for the computer name A physical address that is randomly assigned each time the computer is started ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? SMTP IMAP 2 POP3 DHCP SMTP IMAP 2 POP3 DHCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the address before translation? Inside global Outside local Inside local Outside global Inside global Outside local Inside local Outside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which utility is useful for troubleshooting NetBIOS name resolution problems? Hostname Netstat None of these PING NBTSTAT Hostname Netstat None of these PING NBTSTAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. ANSWER DOWNLOAD EXAMIANS APP