Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 2 and 4 1 and 3 3 and 4 1 and 2 2 and 4 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications system depends on four fundamental characteristics Timeliness Receiver Sender Medium Timeliness Receiver Sender Medium ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is a wrong example of network layer? Internet Protocol (IP) - ARPANET Source routing and domain naming-USENet X.25 Packet Level Protocol (PLP)-ISO X.25 level 2-ISO Internet Protocol (IP) - ARPANET Source routing and domain naming-USENet X.25 Packet Level Protocol (PLP)-ISO X.25 level 2-ISO ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which transmission mode is used for data communication along telephone lines? Serial Synchronous None of these Asynchronous Parallel Serial Synchronous None of these Asynchronous Parallel ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the both A and B Start and stop bit receiving computer transmitting computer None of these both A and B Start and stop bit receiving computer transmitting computer None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will display the CHAP authentication process as it occurs between two routers in the network? show interface serial 0 debug ppp authentication debug chap authentication show chap authentication show interface serial 0 debug ppp authentication debug chap authentication show chap authentication ANSWER DOWNLOAD EXAMIANS APP