Computer Networking Which layer 4 protocol is used for a Telnet connection? TCP/IP UDP IP TCP TCP/IP UDP IP TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HDLC (High-level Data Link Control) is a very common bit-oriented data link protocol issued by ISO. a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network a method access control technique for multiple-access transmission media None of these a very common bit-oriented data link protocol issued by ISO. a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network a method access control technique for multiple-access transmission media None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent switching loops in networks with redundant switched paths To prevent routing loops in networks with redundant paths To create collision domains To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To prevent switching loops in networks with redundant switched paths To prevent routing loops in networks with redundant paths To create collision domains To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The receive equalizer reduces delay distortions using a difference engine descrambler None of these gearshift tapped delay lines difference engine descrambler None of these gearshift tapped delay lines ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement is true regarding classless routing protocols?1. The use of discontiguous networks is not allowed.2. The use of variable length subnet masks is permitted.3. RIPv1 is a classless routing protocol.4. IGRP supports classless routing within the same autonomous system.5. RIPv2 supports classless routing. None of these 2 and 5 1, 3 and 5 3 and 4 None of these 2 and 5 1, 3 and 5 3 and 4 ANSWER DOWNLOAD EXAMIANS APP