Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 1, 3 and 4 1 and 2 2, 3 and 5 3, 4 and 5 1, 3 and 4 1 and 2 2, 3 and 5 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands connect access list 110 inbound to interface ethernet0? Router(config-if)# ip access-group 110 in Router(config)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-list 110 in Router(config-if)# ip access-group 110 in Router(config)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-list 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? None of these IPV5 IPV6 IPV4 None of these IPV5 IPV6 IPV4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224? Router (config) #ip subnet-zero Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 2, 4, and 5 1, 2 and 6 4, 5 and 6 2, 3 and 4 2, 4, and 5 1, 2 and 6 4, 5 and 6 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? single-bit recoverable multiple-bit burst single-bit recoverable multiple-bit burst ANSWER DOWNLOAD EXAMIANS APP