Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 2 and 4 3 and 4 1 and 2 1 and 3 2 and 4 3 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are disadvantages of using NAT?1. Translation introduces switching path delays.2. Conserves legally registered addresses.3. Causes loss of end-to-end IP traceability.4. Increases flexibility when connecting to the Internet.5. Certain applications will not function with NAT enabled.6. Reduces address overlap occurrence. 1, 3 and 5 3 and 4 1 and 3 2, 4 and 5 1, 3 and 5 3 and 4 1 and 3 2, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the receiving computer None of these Start and stop bit transmitting computer both A and B receiving computer None of these Start and stop bit transmitting computer both A and B ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are two purposes for segmentation with a bridge?1. To add more broadcast domains.2. To create more collision domains.3. To add more bandwidth for users.4. To allow more broadcasts for users. 2 and 3 1 only 4 only 2 and 4 2 and 3 1 only 4 only 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network types have a designated router and a backup designated router assigned?1. Broadcast2. Point-to-point3. NBMA4. NBMA point-to-point 1 and 3 1, 2 and 3 All of these 3 and 4 1 and 3 1, 2 and 3 All of these 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The coming together of three technologies i.e. microelectronics, computing and communications has ushered in business revolution information technology information explosion None of these educational upgradation business revolution information technology information explosion None of these educational upgradation ANSWER DOWNLOAD EXAMIANS APP