Computer Networking Which encapsulations can be configured on a serial interface?1. Ethernet2. Token Ring3. HDLC4. Frame Relay5. PPP 2 only All of these 3, 4 and 5 1 and 4 2 only All of these 3, 4 and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The systematic access of small computers in a distributed data processing system is referred to as: multiplexing conversational mode polling None of these dialed service multiplexing conversational mode polling None of these dialed service ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV5 IPV4 IPV6 None of these IPV5 IPV4 IPV6 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use? 255.255.255.248 255.255.255.240 255.255.255.252 255.255.255.224 255.255.255.0 255.255.255.248 255.255.255.240 255.255.255.252 255.255.255.224 255.255.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation? 0x2100 0x2142 0x2101 0x2102 0x2100 0x2142 0x2101 0x2102 ANSWER DOWNLOAD EXAMIANS APP