Computer Networking Which command would you use to apply an access list to a router interface? ip access-list 101 out access-group ip 101 in ip access-group 101 in access-list ip 101 in ip access-list 101 out access-group ip 101 in ip access-group 101 in access-list ip 101 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The basic Ethernet design does not provide multiple virtual networks None of these addressing automatic retransmission of a message access control multiple virtual networks None of these addressing automatic retransmission of a message access control ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 4 only 1 and 4 2 only 1,2 and 3 4 only 1 and 4 2 only 1,2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the None of these transmitting computer receiving computer both A and B Start and stop bit None of these transmitting computer receiving computer both A and B Start and stop bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV6 IPV4 None of these IPV5 IPV6 IPV4 None of these IPV5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The most flexibility in how devices are wired together is provided by ring networks bus networks None of these star networks T-switched networks ring networks bus networks None of these star networks T-switched networks ANSWER DOWNLOAD EXAMIANS APP