Computer Networking Which layer 4 protocol is used for a Telnet connection? IP UDP TCP/IP TCP IP UDP TCP/IP TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HOSTS file entries are limited to how many characters? 500 None of these 8 255 Unlimited 500 None of these 8 255 Unlimited ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following digits are known as the area code of the Network User Address (NUA)? 13-14 05-Jul None of these 08-Dec 01-Apr 13-14 05-Jul None of these 08-Dec 01-Apr ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11a standard? 5Gbps 5GHz 2.4GHz 2.4Gbps 5Gbps 5GHz 2.4GHz 2.4Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link? Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. Only configured VLAN's are allowed on the link. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. Only configured VLAN's are allowed on the link. By default, all VLANs are allowed on the trunk. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP