Computer Networking Which layer 4 protocol is used for a Telnet connection? TCP/IP IP TCP UDP TCP/IP IP TCP UDP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? IPSec VPN xDSL HDLC Cable IPSec VPN xDSL HDLC Cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: modulation synchronizing synchronizing demodulation None of these modulation synchronizing synchronizing demodulation None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following access lists will allow only HTTP traffic into network 196.15.7.0? access-list 100 permit 196.15.7.0 0.0.0.255 eq www access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www access-list 10 deny tcp any 196.15.7.0 eq www access-list 110 permit ip any 196.15.7.0 0.0.0.255 access-list 100 permit 196.15.7.0 0.0.0.255 eq www access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www access-list 10 deny tcp any 196.15.7.0 eq www access-list 110 permit ip any 196.15.7.0 0.0.0.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? 172.16.96.0 172.16.112.0 172.16.0.0 172.16.255.0 172.16.96.0 172.16.112.0 172.16.0.0 172.16.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A modem is connected in between a telephone line and a communication adapter computer network None of these serial port communication adapter computer network None of these serial port ANSWER DOWNLOAD EXAMIANS APP