Computer Networking What protocol is used between E-Mail servers? FTP POP3 SNMP None of these SMTP FTP POP3 SNMP None of these SMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback interface? The highest IP address of any logical interface The lowest IP address of any logical interface The highest IP address of any physical interface The lowest IP address of any physical interface The highest IP address of any logical interface The lowest IP address of any logical interface The highest IP address of any physical interface The lowest IP address of any physical interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How can you see the address of the DHCP server from which a client received its IP address? None of these By using IPCONFIG/ALL By using DHCPINFO By pinging DHCP By using Advanced Properties of TCP/IP None of these By using IPCONFIG/ALL By using DHCPINFO By pinging DHCP By using Advanced Properties of TCP/IP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will display the CHAP authentication process as it occurs between two routers in the network? show chap authentication debug ppp authentication show interface serial 0 debug chap authentication show chap authentication debug ppp authentication show interface serial 0 debug chap authentication ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The topology with highest reliability is: Star topology Bus topology Ring topology Mesh topology Star topology Bus topology Ring topology Mesh topology ANSWER DOWNLOAD EXAMIANS APP