Computer Networking Which command would you use to apply an access list to a router interface? access-group ip 101 in ip access-list 101 out ip access-group 101 in access-list ip 101 in access-group ip 101 in ip access-list 101 out ip access-group 101 in access-list ip 101 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Different computers are connected to a LAN by a cable and a/an None of these modem telephone lines interface card special wires None of these modem telephone lines interface card special wires ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down." Data Link layer Network layer Physical layer None. It is a router problem. Data Link layer Network layer Physical layer None. It is a router problem. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Switched repeaters Token passing Collision detection CSMA/CD Time sharing Switched repeaters Token passing Collision detection CSMA/CD Time sharing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11b standard? 5Gbps 2.4GHz 5GHz 2.4Gbps 5Gbps 2.4GHz 5GHz 2.4Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Four Two Three Five Six Four Two Three Five Six ANSWER DOWNLOAD EXAMIANS APP