Computer Networking Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size? 16 None of these 4 8 15 16 None of these 4 8 15 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What function does a serial interface perform in data communication? Converts analog signals into digital signals Converts serial data into audio signals Converts parallel data into a stream of bits None of these Decodes incoming signals into computer data Converts analog signals into digital signals Converts serial data into audio signals Converts parallel data into a stream of bits None of these Decodes incoming signals into computer data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? None of these Layer 4 protocols Layer 7 protocols Layer 5 protocols Layer 6 protocols None of these Layer 4 protocols Layer 7 protocols Layer 5 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The X.25 standard specifies a None of these data bit rate DTE/DCE interface technique for start-stop data technique for dial access None of these data bit rate DTE/DCE interface technique for start-stop data technique for dial access ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: OSI Virtual Private Network Network operating system Network Server OSI Virtual Private Network Network operating system Network Server ANSWER DOWNLOAD EXAMIANS APP