Computer Networking What is the port number for NNTP? 70 119 79 80 None of these 70 119 79 80 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following medium access control technique is used for bus/tree? token bus None of these MAC token ring CSMA token bus None of these MAC token ring CSMA ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Where are EIGRP successor routes stored? In the topology table only In the routing table and the neighbor table In the neighbor table only In the routing table only In the routing table and the topology table In the topology table only In the routing table and the neighbor table In the neighbor table only In the routing table only In the routing table and the topology table ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? reload copy run start replace run start copy start run reload copy run start replace run start copy start run ANSWER DOWNLOAD EXAMIANS APP