Computer Networking Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model? xDSL VPN HDLC IPSec Cable xDSL VPN HDLC IPSec Cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the destination host after translation? Inside local Outside local Outside global Inside global Inside local Outside local Outside global Inside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the followings is used in communications is referred to as unshielded twisted-pair (UTP)? Coaxial cable Fiber-optic cable Twisted-pair cable None of these Coaxial cable Fiber-optic cable Twisted-pair cable None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The size or magnitude of a voltage or current waveform is Amplitude Angle Modulation Attenuation Aloha None of these Amplitude Angle Modulation Attenuation Aloha None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following file retrieval methods use hypermedia? Veronica WAIS None of these HTTP Archie Veronica WAIS None of these HTTP Archie ANSWER DOWNLOAD EXAMIANS APP