Computer Networking Which of the following medium access control technique is used for bus/tree? CSMA None of these token bus token ring MAC CSMA None of these token bus token ring MAC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer: Internet works Internet technologies Internet revolution None of these The Internet Internet works Internet technologies Internet revolution None of these The Internet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? None of these delta routing static routing flooding hot potato routing None of these delta routing static routing flooding hot potato routing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Layer 2 switching provides which of the following?1. Hardware-based bridging (ASIC)2. Wire speed3. Low latency4. Low cost All of these 1 and 3 1, 2 and 4 2 and 4 All of these 1 and 3 1, 2 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP