Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 2 and 4 1 and 3 3 and 4 1 and 2 2 and 4 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In CRC the quotient at the sender becomes the dividend at the receiver is discarded is the remainder becomes the divisor at the receiver becomes the dividend at the receiver is discarded is the remainder becomes the divisor at the receiver ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the wrong data communication system component: Transits Protocol Receiver Medium Transits Protocol Receiver Medium ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the address of the router? None of these The TCP address The default gateway The subnet mask The IP address None of these The TCP address The default gateway The subnet mask The IP address ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What frequency range is used for TV transmission and low power microwave applications? Super High Frequency : 3000 MHz to 30000 MHz None of these Ultra High Frequency : 300 MHz to 3000 MHz Medium Frequency : 300 kHz to 3 MHz Very Low Frequency : 3 kHz to 30 kHz Super High Frequency : 3000 MHz to 30000 MHz None of these Ultra High Frequency : 300 MHz to 3000 MHz Medium Frequency : 300 kHz to 3 MHz Very Low Frequency : 3 kHz to 30 kHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? prefix-length / (slash notation) no mask block-size prefix-length / (slash notation) no mask block-size ANSWER DOWNLOAD EXAMIANS APP