Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 1 and 2 3 and 4 2 and 4 1 and 3 1 and 2 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts? 255.255.255.224 255.255.255.252 255.255.255.192 255.255.255.240 255.255.255.248 255.255.255.224 255.255.255.252 255.255.255.192 255.255.255.240 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the decimal and hexadecimal equivalents for the binary number 10110111? 69/0x2102 83/0xC5 183/B7 173/A6 69/0x2102 83/0xC5 183/B7 173/A6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Devices interconnected by the LAN should include mass storage device, printers and plotters bridges and gateways All of these None of these Computers and terminals mass storage device, printers and plotters bridges and gateways All of these None of these Computers and terminals ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 6 protocols None of these Layer 7 protocols Layer 5 protocols Layer 4 protocols Layer 6 protocols None of these Layer 7 protocols Layer 5 protocols Layer 4 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? 172.16.255.0 172.16.112.0 172.16.0.0 172.16.96.0 172.16.255.0 172.16.112.0 172.16.0.0 172.16.96.0 ANSWER DOWNLOAD EXAMIANS APP