Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 2 and 4 1 and 3 1 and 2 3 and 4 2 and 4 1 and 3 1 and 2 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error control is needed at the transport layer because of potential errors occurring _____. from transmission line noise from out-of-sequence delivery in routers from packet losses. from transmission line noise from out-of-sequence delivery in routers from packet losses. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? SNMP ARP DHCP SMTP SNMP ARP DHCP SMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the illustration from the previous question, what would be the IP address of SO if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question. 192.168.10.62 192.168.10.30 192.168.10.127 192.168.10.24 192.168.10.62 192.168.10.30 192.168.10.127 192.168.10.24 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A band is always equivalent to a byte 16 bits 100 bits None of these a bit a byte 16 bits 100 bits None of these a bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 2 and 4 1, 4 and 6 3 and 5 1 and 4 2 and 4 1, 4 and 6 3 and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP