Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 2 and 4 1 and 3 3 and 4 1 and 2 2 and 4 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the loopback address? 255.255.0.0 127.0.0.1 255.255.255.255.0 None of these 255.0.0.0 255.255.0.0 127.0.0.1 255.255.255.255.0 None of these 255.0.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? The update will be ignored and no further action will occur. They will all load-balance. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The updated information will be added to the existing routing table. The updated information will replace the existing routing table entry. The update will be ignored and no further action will occur. They will all load-balance. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. The updated information will be added to the existing routing table. The updated information will replace the existing routing table entry. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 5 protocols Layer 4 protocols Layer 6 protocols None of these Layer 7 protocols Layer 5 protocols Layer 4 protocols Layer 6 protocols None of these Layer 7 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking ICMP (Internet Control Message Protocol) is None of these a TCP/IP high level protocol for transferring files from one machine to another a protocol used to monitor computers a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a protocol that handles error and control messages None of these a TCP/IP high level protocol for transferring files from one machine to another a protocol used to monitor computers a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a protocol that handles error and control messages ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as Angle modulation modem Amplitude modulation Aloha None of these Angle modulation modem Amplitude modulation Aloha None of these ANSWER DOWNLOAD EXAMIANS APP