Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 3 and 4 2 and 4 1 and 2 1 and 3 3 and 4 2 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates? Router (config-router) # passive-interface s0 Router (config-if) # no routing Router (config-router) # no routing updates Router (config-if) # passive-interface Router (config-router) # passive-interface s0 Router (config-if) # no routing Router (config-router) # no routing updates Router (config-if) # passive-interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is used for modulation and demodulation? protocols gateway modem multiplexer None of these protocols gateway modem multiplexer None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Brad is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is excellent. Which network(s) would be the best to set up? Server-based Share-level Peer-to-peer Master domain Ethernet Server-based Share-level Peer-to-peer Master domain Ethernet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which of the following technologies is the term HFC used? DSL Dedicated T1 Frame Relay PPPoE DSL Dedicated T1 Frame Relay PPPoE ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Synchronous protocols transmit characters one at a time are generally used by personal computers None of these allow faster transmission than asynchronous protocols do are more reliable transmit characters one at a time are generally used by personal computers None of these allow faster transmission than asynchronous protocols do are more reliable ANSWER DOWNLOAD EXAMIANS APP