Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 3 and 4 2 and 4 1 and 2 1 and 3 3 and 4 2 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV4 None of these IPV6 IPV5 IPV4 None of these IPV6 IPV5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The area of coverage of a satellite radio beam is known as Beam width None of these Identity Footprint Circular polarization Beam width None of these Identity Footprint Circular polarization ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean? The route has a delay of 16 microseconds. The route is inaccessible. The route is 16 hops away. They will all load-balance. The route is queued at 16 messages a second. The route has a delay of 16 microseconds. The route is inaccessible. The route is 16 hops away. They will all load-balance. The route is queued at 16 messages a second. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default? Any available route They will all load-balance. IGRP route Static route RIP route Any available route They will all load-balance. IGRP route Static route RIP route ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm? 500 bps 1000 bps 5 bps None of these 1500 bps 500 bps 1000 bps 5 bps None of these 1500 bps ANSWER DOWNLOAD EXAMIANS APP