Computer Networking A distributed network configuration in which all data/information pass through a central computer is ring network Point-to-point network star network None of these bus network ring network Point-to-point network star network None of these bus network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as User Agent Gateways None of these mail gateway bridges User Agent Gateways None of these mail gateway bridges ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use TCP?1. DHCP2. SMTP3. HTTP4. TFTP5. FTP 1, 2 and 4 2, 3 and 5 1 and 2 1, 3 and 4 1, 2 and 4 2, 3 and 5 1 and 2 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error control is needed at the transport layer because of potential errors occurring _____. from packet losses. from transmission line noise from out-of-sequence delivery in routers from packet losses. from transmission line noise from out-of-sequence delivery in routers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be? No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Everything but email and Telnet will be allowed out E0. Email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Everything but email and Telnet will be allowed out E0. Email and Telnet will be allowed out E0. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 3 3, 4 and 5 2 and 3 1 and 4 1 and 3 3, 4 and 5 2 and 3 1 and 4 ANSWER DOWNLOAD EXAMIANS APP