Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV5 IPV4 IPV6 None of these IPV5 IPV4 IPV6 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which switching technology reduces the size of a broadcast domain? VLANs 802.1Q STP ISL VLANs 802.1Q STP ISL ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used between E-Mail servers? SMTP POP3 FTP SNMP None of these SMTP POP3 FTP SNMP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal? Switches Bridges Managed hubs Switches configured with VLANs Switches Bridges Managed hubs Switches configured with VLANs ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The EIA-232 interface has _____ pins. 20 30 None of these 25 24 20 30 None of these 25 24 ANSWER DOWNLOAD EXAMIANS APP