Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as User Agent Gateways bridges None of these mail gateway User Agent Gateways bridges None of these mail gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following might be used by a company to satisfy its growing communications needs? concentrator All of these front-end processor multiplexer controller concentrator All of these front-end processor multiplexer controller ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Start and stop bits are used in serial communication for Error correction Slowing down the communication Error detection Synchronization Error correction Slowing down the communication Error detection Synchronization ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you use either Telnet or FTP, which is the highest layer you are using to transmit data? Transport Session Presentation Application Transport Session Presentation Application ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____. 42 even indeterminate odd 42 even indeterminate odd ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 ANSWER DOWNLOAD EXAMIANS APP