Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? Cable xDSL VPN IPSec HDLC Cable xDSL VPN IPSec HDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Sending a file from your personal computer's primary memory or disk to another computer is called downloading None of these uploading hang on logging on downloading None of these uploading hang on logging on ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 201.142.23.12, what is your default subnet mask? 0.0.0.0 None of these 255.255.0.0 255.0.0.0 255.255.255.0 0.0.0.0 None of these 255.255.0.0 255.0.0.0 255.255.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A modem is connected in between a telephone line and a serial port computer None of these network communication adapter serial port computer None of these network communication adapter ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Time required for a message to travel from one device to another is known as: Response time Dialogue time Transit time Wait time Response time Dialogue time Transit time Wait time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. ANSWER DOWNLOAD EXAMIANS APP