Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? BootP TCP ICMP ARP BootP TCP ICMP ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error-detecting code inserted as a field in a block of data to be transmitted is known as Frame check sequence None of these Checksum flow control Error detecting code Frame check sequence None of these Checksum flow control Error detecting code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Checksum Error detecting code Cyclic redundancy check Error rate None of these Checksum Error detecting code Cyclic redundancy check Error rate None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications system depends on four fundamental characteristics Receiver Medium Sender Timeliness Receiver Medium Sender Timeliness ANSWER DOWNLOAD EXAMIANS APP
Computer Networking which of the following is not a field in the Ethernet Message packet? Type Data Pin-code Address Type Data Pin-code Address ANSWER DOWNLOAD EXAMIANS APP