Computer Networking What operates in the Data Link and the Network layer? Router NIC Brouter Bridge None of these Router NIC Brouter Bridge None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use? 255.255.224.0 255.255.192.0 255.255.248.0 255.255.255.0 255.255.240.0 255.255.224.0 255.255.192.0 255.255.248.0 255.255.255.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A data communications system has: 5 components 6 components 7 components 4 components 5 components 6 components 7 components 4 components ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The slowest transmission speeds are those of coaxial cable fiber-optic cable microwaves twisted-pair wire coaxial cable fiber-optic cable microwaves twisted-pair wire ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? UDP SMTP X.25 VMTP None of these UDP SMTP X.25 VMTP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP