Advertisement
E. Stanley, Technical writer
Answered: Jul 17, 2018
Multiple devices work at different layers of the OSI model. Each has its own function and a specific niche that cannot be taken up by the other device. For instance, the options A and b are needs...Read More

3 Answers

462 views
C. Block, English Professor
Answered: Dec 17, 2018
There are many layers in the Open Systems Interconnection model. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer and...Read More

2 Answers

441 views
H. Jones, Web Content Writer
Answered: Oct 09, 2018
Hub is the correct answer. The OSI model has several layers and one of them is the physical layer. The hub’s location is one of the lowest layers of the OSI network model. The...Read More

2 Answers

438 views
Mfmoeykens
Answered: Oct 30, 2020
00:D0:59:09:07:51

The MAC address is a 6-byte address expressed in six pairs of hexadecimal values. Because it is hexadecimal, only the letters A through F and numbers can be used. Answer B...Read More

1 Answer

423 views
John Adney
Answered: Jun 14, 2017

Mesh is not a historical network topology.

2 Answers

398 views
John Smith
Answered: Oct 30, 2020
Tracert-tracert is a windows command that can be used to display the full path between two systems, including the number of hops between the systems. the ping utility (answer a) can be used to test...Read More

1 Answer

395 views
Snordlund
Answered: Sep 23, 2019
Looking at the subnet mask we see that the highest 5 octets are full, meaning we have a range of 7 one will be the network address, 5 usable addresses and the last will be the broadcast...Read More

2 Answers

385 views
Mfmoeykens
Answered: Oct 30, 2020
Establish a theory of probable cause.

The next step is to establish a theory of probable cause. The steps in the methodology are 1. Identify the problem, 2. Establish a theory of probable...Read More

1 Answer

364 views
G.Kenneth
Answered: Jan 24, 2018
Peer to Peer networking is when networking is able to communicate with other components by sending messages through a process. Peer to Peer is also known as P2P in which it divides the jobs or...Read More

2 Answers

355 views
Steven Holloway
Answered: Feb 17, 2020
Ok, so the question asks for a centralized Authentication method. This would be the Radius. I realize that "DHCP" is marked as the correct answer, but I believe this to be incorrect as DHCP only...Read More

3 Answers

345 views
Chris Kenway, Content Writer
Answered: Oct 11, 2018
Star is the easiest network type to add new node. Every node in a star network has it's own cable which is directly connected to the central network (hub) without disrupting current users of the...Read More

2 Answers

330 views
John Smith
Answered: Oct 30, 2020
Identify the affected area-once you have identified the symptoms, you must determine which part of the network is affected by the same symptoms.incorrect answers:a: selecting the most probable cause...Read More

1 Answer

322 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.