Computer Networking What is the name of the software package that allows people to send electronic mail along a network of computers and workstations? Project management package Data communication package Memory resident package Electronic mail package None of these Project management package Data communication package Memory resident package Electronic mail package None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ houses the switches in token ring. transceiver nine-pin connector MAU NIC None of these transceiver nine-pin connector MAU NIC None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Why does the data communication industry use the layered OSI reference model?1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.4. It encourages industry standardization by defining what functions occur at each layer of the model. 2 and 3 1 and 4 1 only 3 only 2 and 3 1 and 4 1 only 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)? first five first three first four first seven None of these first five first three first four first seven None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 1 and 4 3 and 5 1, 4 and 6 2 and 4 1 and 4 3 and 5 1, 4 and 6 2 and 4 ANSWER DOWNLOAD EXAMIANS APP