Computer Networking
The packets switching concept was first proposed

in the late 1980s for the Defense Ministry of US.
in the late 1950s for Defense Ministry of US
None of these
in the early 1960s for military communication systems, mainly to handle speech
All of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?

access-list 110 permit ip any 196.15.7.0 0.0.0.255
access-list 100 permit 196.15.7.0 0.0.0.255 eq www
access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
access-list 10 deny tcp any 196.15.7.0 eq www

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for fragment?

All of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
None of these
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is route poisoning?

It prevents regular update messages from reinstating a route that has just come up.
It describes when a router sets the metric for a downed link to infinity.
It sends back the protocol received from a router as a poison pill, which stops the regular updates.
It is information received from a router that can't be sent back to the originating router.

ANSWER DOWNLOAD EXAMIANS APP