Computer Networking
Which of the following are TCP/IP protocols used at the Application layer of the OSI model?1. IP2. TCP3. Telnet4. FTP5. TFTP

1, 3 and 5
3, 4 and 5
All of these
1 and 3

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

access-list 10 deny 172.16.48.0 0.0.15.255
access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.48.0 255.255.240.0

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is the problem with an interface if you type show interface serial 0 and receive the following message? "Serial0 is administratively down, line protocol is down."

No cable is attached.
The keepalives are different times.
The administrator is pinging from the interface.
The administrator has the interface shut down.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
MAC is

a method of determining which device has access to the transmission medium at any time
network access standard for connecting stations to a circuit-switched network
a very common bit-oriented data link protocol issued to ISO.
a method access control technique or multiple-access transmission media
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Why does the data communication industry use the layered OSI reference model?1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.4. It encourages industry standardization by defining what functions occur at each layer of the model.

1 only
1 and 4
3 only
2 and 3

ANSWER DOWNLOAD EXAMIANS APP