Computer Networking
Which of the following is true regarding access lists applied to an interface?

One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
You can apply two access lists to any interface.
You can place as many access lists as you want on any interface until you run out of memory.
You can apply only one access list on any interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
An additional token is added for every 1,000 nodes
The network becomes more efficient
The network becomes less efficient
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Bus is

a collection of interconnected functional units that provides a data communications service among stations attached to the network
one or more conductors that some as a common connection for a related group of devices
the condition when two or more stations attempt to use the same channel at the same time
a continuous frequency capable of being modulated or impressed with a second signal
None of these

ANSWER DOWNLOAD EXAMIANS APP