Computer Networking If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n) None of these POS terminal intelligent terminal batch processing terminal data collection terminal None of these POS terminal intelligent terminal batch processing terminal data collection terminal ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose? Network Monitor NETSTAT Performance Monitor DHCP Management Console NBTSTAT Network Monitor NETSTAT Performance Monitor DHCP Management Console NBTSTAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type the following command into the router and receive the following output:Router#show serial 0/0 ^% Invalid input detected at '^' marker.Why was this error message displayed? You cannot have a space between serial and 0/0. Part of the command is missing. The router does not have a serial0/0 interface. You need to be in privileged mode. You cannot have a space between serial and 0/0. Part of the command is missing. The router does not have a serial0/0 interface. You need to be in privileged mode. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. ICMP guarantees datagram delivery.2. ICMP can provide hosts with information about network problems.3. ICMP is encapsulated within IP datagrams.4. ICMP is encapsulated within UDP datagrams. All of these 1 only 1 and 4 2 and 3 All of these 1 only 1 and 4 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a group of computers is connected together in a small area without the help of telephone lines, it is called Remote communication network (RCN) Value added network (VAN) None of these Wide area network (WAN) Local area network(LAN) Remote communication network (RCN) Value added network (VAN) None of these Wide area network (WAN) Local area network(LAN) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 3 and 4 1 and 3 1 and 2 2 and 4 3 and 4 1 and 3 1 and 2 2 and 4 ANSWER DOWNLOAD EXAMIANS APP