What is a backoff on an 802.3 networks
A. It is latency in store and forward switching
B. It is the time used for token passing from machine to machine
C. It is the retransmission delay that is enforced when a
collision occurs
D. it is the result of two nodes transmitting at the same
time. The frames from each transmitting device collide and
are damaged.
Answers were Sorted based on User's Feedback
Answer / rohit dodia
C. It is the retransmission delay that is enforced when a
collision occurs
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / rohit dodia
C. It is the retransmission delay that is enforced when a
collision occurs
Is This Answer Correct ? | 0 Yes | 1 No |
Identify the OSI layer which is responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
What does the ping response & mean? * A: unreachable * B: congestion * C: user interrupt * D: unknown packet type * E: lifetime exceeded
What is the function of the Application Layer in networking?
The CSMA/CD Ethernet IEEE committee is defined as which of the following? A.) 802.2 B.) 802.3 C.) 802.4 D.) 802.5
An user from the LAN is able to ping the default gateway of the router and other sites in the internet. but not able to ping only the google site, no acc list configured and no firewall and no problem with DNS atall. What may be the problem with router?
Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0
How can we configure Inter-VLAN in Layer 3 Switch? Remember one thing without Router.
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D)Configured for PPP
What is the network subnet?
You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240