Computer Networking Which of the following describe router functions? Path selection Internetwork communication All of these Packet filtering Packet switching Path selection Internetwork communication All of these Packet filtering Packet switching ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Start and stop bits are used in serial communication for Synchronization Slowing down the communication Error detection Error correction Synchronization Slowing down the communication Error detection Error correction ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will configure all the default VTY ports on a router? Router (config-if) #line console 0 Router (config) #line vty 0 4 Router#line vty 0 4 Router (config) #line vty all Router (config-if) #line console 0 Router (config) #line vty 0 4 Router#line vty 0 4 Router (config) #line vty all ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error rate Checksum Cyclic redundancy check Error detecting code None of these Error rate Checksum Cyclic redundancy check Error detecting code None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP