Computer Networking If you use either Telnet or FTP, which is the highest layer you are using to transmit data? Session Transport Presentation Application Session Transport Presentation Application ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network access standard is used for connecting stations to a packet-switched network? None of these X.21 X.75 X.25 X.3 None of these X.21 X.75 X.25 X.3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer. Duplicate addresses Duplicate subnets Duplicate pools Duplicate default gateways None of these Duplicate addresses Duplicate subnets Duplicate pools Duplicate default gateways None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at a data link level is achieved by bit stuffing Hamming codes cyclic redundancy codes None of these equalization bit stuffing Hamming codes cyclic redundancy codes None of these equalization ANSWER DOWNLOAD EXAMIANS APP