Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 1, 3 and 4 1 and 2 3 only 2 only 1, 3 and 4 1 and 2 3 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The main difference between TCP and UDP is UDP is connection oriented where as TCP is datagram service UDP is a datagram where as TCP is a connection oriented service None of these All of these TCP is an Internet protocol where as UDP is an ATM protocol UDP is connection oriented where as TCP is datagram service UDP is a datagram where as TCP is a connection oriented service None of these All of these TCP is an Internet protocol where as UDP is an ATM protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV5 IPV6 IPV4 None of these IPV5 IPV6 IPV4 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command would you place on interface connected to the Internet? ip inside local ip nat outside ip nat inside ip outside global ip inside local ip nat outside ip nat inside ip outside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is None of these X.75 X.21 X.25 X.400 None of these X.75 X.21 X.25 X.400 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 ANSWER DOWNLOAD EXAMIANS APP