which of the following address types?
A host has been assigned the address 169.254.0.1.
This is an example of which of the following address types? client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft.
which of the following subnet masks should Joe use for …
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers.
In order to conserve address space, which of the following subnet masks should Joe use for this subnet? addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.
Which of the following is a valid IPv4 loopback address?
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.
Which of the following is an example of an IPv4 address?
Which of the following is an example of an IPv4 address? a 32-bit binary IPv4 address.
Which of the following describes an IPv6 address of ::1?
Which of the following describes an IPv6 address of ::1? computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.
Which of the following network infrastructure implement…
Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones? of 10 meters and commonly using a wireless technology such as Bluetooth or IR (Infra-Red).
Which of the following refers to a network that spans s…
Which of the following refers to a network that spans several buildings that are within walking distance of each other? domain and they are connected with a network, then it will be considered as a CAN.
Which of the following network topologies has a central…
Which of the following network topologies has a central, single point of failure? switch (or a less commonly a hub) form a star network. has a MAC address table which it populates with the MAC address of every device connected to the switch. discover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to. computers will be able to communicate with each other.
which of the following?
A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? switch (or a less commonly a hub) form a star network. has a MAC address table which it populates with the MAC address of every device connected to the switch. port that the destination computer is connected to.
Which of the following topologies would the engineer im…
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions.
Which of the following topologies would the engineer implement? computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment. uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data before releasing the token. Only a computer in possession of the token can transmit data onto the network.