Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? VPN IPSec xDSL Cable HDLC VPN IPSec xDSL Cable HDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? Modem options None of these Duplexing Handshaking Protocol Modem options None of these Duplexing Handshaking Protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 4, 5 and 6 2, 4, and 5 1, 2 and 6 2, 3 and 4 4, 5 and 6 2, 4, and 5 1, 2 and 6 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following files is used for NetBIOS name resolution? FQDN HOSTS None of these ARP LMHOSTS FQDN HOSTS None of these ARP LMHOSTS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.192.0 255.255.224.0 255.255.252.0 255,255.248.0 255.255.240.0 255.255.192.0 255.255.224.0 255.255.252.0 255,255.248.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables. star None of these mesh bus ring star None of these mesh bus ring ANSWER DOWNLOAD EXAMIANS APP