Computer Networking
Which of the following is true regarding access lists applied to an interface?

You can apply two access lists to any interface.
One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
You can place as many access lists as you want on any interface until you run out of memory.
You can apply only one access list on any interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Error detecting code is

a check bit appended to an array of binary digits to make the sum of all the binary digits.
None of these
the ratio of the data units in error to the total number of data units
an error-detecting code based on a summation operation performed on the bits to be checked
a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
A front-end processor is

a user computer system
a minicomputer that relieves main-frame computers at a computer centre of communications control functions
None of these
a processor in a large-scale computer that executes operating system instructions
preliminary processor of batch jobs.

ANSWER DOWNLOAD EXAMIANS APP