Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Virtual Private Network OSI Network operating system Network Server Virtual Private Network OSI Network operating system Network Server ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A remote batch-processing operation in which data is solely input to a central computer would require a: simplex lines All listed here mixedband channel None of these telegraph line simplex lines All listed here mixedband channel None of these telegraph line ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will show you whether a DTE or a DCE cable is plugged into serial 0? show serial 0 controllers sh int s0 sh int serial 0 show controllers serial 0 show serial 0 controllers sh int s0 sh int serial 0 show controllers serial 0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: hierarchical network ring network data control network spider network None of these hierarchical network ring network data control network spider network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are true regarding OSPF areas?1. You must have separate loopback interfaces configured in each area.2. The numbers you can assign an area go up to 65,535.3. The backbone area is also called area 0.4. If your design is hierarchical, then you don't need multiple areas.5. All areas must connect to area 0. 3 and 4 only 1 and 2 only 3, 4 and 5 1 only 3 and 4 only 1 and 2 only 3, 4 and 5 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transmission signal coding method of TI carrier is called NRZ Binary None of these Bipolar Manchester NRZ Binary None of these Bipolar Manchester ANSWER DOWNLOAD EXAMIANS APP