Computer Networking Which network topology is considered passive? Cross Star Bus Mesh Ring Cross Star Bus Mesh Ring ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What OSI layer handles logical address to logical name resolution? Presentation Physical Data Link Transport An alias for the computer name Presentation Physical Data Link Transport An alias for the computer name ANSWER DOWNLOAD EXAMIANS APP
Computer Networking UDP is: Connection oriented and unreliable Not a part of the TCP/IP suite None of these Connection orientated and reliable Connectionless and unreliable Connection oriented and unreliable Not a part of the TCP/IP suite None of these Connection orientated and reliable Connectionless and unreliable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose? Network Monitor DHCP Management Console NETSTAT Performance Monitor NBTSTAT Network Monitor DHCP Management Console NETSTAT Performance Monitor NBTSTAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? prefix-length block-size / (slash notation) no mask prefix-length block-size / (slash notation) no mask ANSWER DOWNLOAD EXAMIANS APP