Computer Networking Terminals are required for realtime, batch processing, and timesharing realtime, timesharing, and message switching realtime, timesharing, and distributed processing realtime, distributed processing, and manager inquiry None of these realtime, batch processing, and timesharing realtime, timesharing, and message switching realtime, timesharing, and distributed processing realtime, distributed processing, and manager inquiry None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a standard IP access list? access-list 1 permit 172.16.10.1 255.255.0.0 access-list standard 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list 110 permit host 1.1.1.1 access-list 1 permit 172.16.10.1 255.255.0.0 access-list standard 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list 110 permit host 1.1.1.1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to control how messages are passed between computers echo every character that is received rearrange the connections between computing equipment transmit characters one at a time None of these control how messages are passed between computers echo every character that is received rearrange the connections between computing equipment transmit characters one at a time None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 only 1 only 3 and 4 1, 3 and 4 3 only 1 only 3 and 4 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name of the device that connects two computers by means of a telephone line? cable Tape None of these bus modem cable Tape None of these bus modem ANSWER DOWNLOAD EXAMIANS APP