If there is only 2 host in bus topology is that possible collision accord?
No Answer is Posted For this Question
Be the First to Post Answer
Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay
Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address
In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
What is collision?
1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192.168.10.0/24 network is connected from fa0/1 192.168.20.0/24 network is connected all bacsic routing is done will they communicate 3 what is difference between snmp v1 v2 and v3 what difference between name and stranded access list
A default route is analogous to a _________. A. default gateway B. static route C. dynamic route D. one-way route
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
Tell me how many hop counts are by default and how much you can increase in eigrp protocol?
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal number B. 24 bits expressed as a hexadecimal number C. 36 bits expressed as a binary number D. 48 bits expressed as a decimal number E. 48 bits expressed as a hexadecimal number
Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End