Computer Networking What operates in the Data Link and the Network layer? Router Brouter NIC None of these Bridge Router Brouter NIC None of these Bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement(s) about IPv6 addresses are true?1. Leading zeros are required.2. Two colons (::) are used to represent successive hexadecimal fields of zeros.3. Two colons (::) are used to separate fields.4. A single interface will have multiple IPv6 addresses of different types. 1 and 3 2 and 4 All of these 1, 3 and 4 1 and 3 2 and 4 All of these 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The interactive transmission of data within a time sharing system may be best suited to half-duplex lines simplex lines biflex-line None of these full-duplex lines half-duplex lines simplex lines biflex-line None of these full-duplex lines ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 1 and 3 3 and 4 2 and 4 1 and 2 1 and 3 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To test the IP stack on your local host, which IP address would you ping? 127.0.0.255 127.0.0.1 1.0.0.127 127.0.0.0 127.0.0.255 127.0.0.1 1.0.0.127 127.0.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use? 255.255.192.0 255.255.248.0 255.255.240.0 255.255.255.0 255.255.224.0 255.255.192.0 255.255.248.0 255.255.240.0 255.255.255.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP