Why subnetting is used?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises
How can you measure out exactly 4 litres of water from a tap using a 3 litre and a 5 litre bucket?
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
What is the difference between static ip addressing and dynamic ip addressing?
What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA
Novell IPX network addresses have two conferrable parts. The network administrator specifies the IPX network number. How is the node number determined? A. It is the serial number of the given device B. It is assigned as a lease by Novell DHCP C. It is also set by the network administrator D. It is usually the MAC address of one Interface E. It is downloaded by Netware Core Protocol (NCP)
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward
what is the main features of link state routing protocols?
Define topology?
What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolution C.) Mac to IP address resolution D.) IP to Mac address resolution
4 Answers Cordys, Punjabi University,
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127