Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Virtual Private Network Network operating system Network Server OSI Virtual Private Network Network operating system Network Server OSI ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the loopback address? 255.0.0.0 127.0.0.1 255.255.0.0 255.255.255.255.0 None of these 255.0.0.0 127.0.0.1 255.255.0.0 255.255.255.255.0 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.240.0 255,255.248.0 255.255.192.0 255.255.224.0 255.255.252.0 255.255.240.0 255,255.248.0 255.255.192.0 255.255.224.0 255.255.252.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Brad is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is excellent. Which network(s) would be the best to set up? Ethernet Share-level Master domain Server-based Peer-to-peer Ethernet Share-level Master domain Server-based Peer-to-peer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the port number for POP3? 49 80 90 110 49 80 90 110 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The encoding method specified in the EIA-232 standard is _____. Manchester NRZ-L None of these NRZ-I Differential Manchester Manchester NRZ-L None of these NRZ-I Differential Manchester ANSWER DOWNLOAD EXAMIANS APP