Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 3 and 4 1 and 3 2 and 4 1 and 2 3 and 4 1 and 3 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The loss in signal power as light travels down the fiber is called propagation None of these interruption scattering attenuation propagation None of these interruption scattering attenuation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following might be used by a company to satisfy its growing communications needs? All of these front-end processor multiplexer controller concentrator All of these front-end processor multiplexer controller concentrator ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What multicast addresses does RIPng use? FF02::A FF02::9 FF02::5 FF02::6 FF02::A FF02::9 FF02::5 FF02::6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In cyclic redundancy checking, the divisor is _____ the CRC. two bits more the same size as one bit more than one bit less than None of these two bits more the same size as one bit more than one bit less than None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? When upper-layer protocols require high reliability After broken links are reestablished During high-traffic periods In an improperly implemented redundant topology When upper-layer protocols require high reliability After broken links are reestablished During high-traffic periods In an improperly implemented redundant topology ANSWER DOWNLOAD EXAMIANS APP