Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 2 and 4 1 and 2 3 and 4 1 and 3 2 and 4 1 and 2 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data communication support should include, but is not restricted to terminal support, electronic mail and voice grams. All of these file and database access file transfer and transaction processing terminal support, electronic mail and voice grams. All of these file and database access file transfer and transaction processing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server? None of these RDP RARP RIP X.25 None of these RDP RARP RIP X.25 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The communication mode that supports data in both directions at the same time is simplex None of these multiplex half-duplex full-duplex simplex None of these multiplex half-duplex full-duplex ANSWER DOWNLOAD EXAMIANS APP
Computer Networking TCP is: Operates at the Data Link layer Connection orientated and reliable Connection orientated and unreliable Connectionless and unreliable None of these Operates at the Data Link layer Connection orientated and reliable Connection orientated and unreliable Connectionless and unreliable None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode. 5 only 2 and 4 1, 2, and 5 2, 3 and 4 5 only 2 and 4 1, 2, and 5 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP