Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? HDLC VPN xDSL Cable IPSec HDLC VPN xDSL Cable IPSec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use? 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.248 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as Amplitude Aloha Attenuation Carrier None of these Amplitude Aloha Attenuation Carrier None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need the IP address of the devices with which the router has established an adjacency. Also, the retransmit interval and the queue counts for the adjacent routers need to be checked. What command will display the required information? show ip eigrp adjacency show ip eigrp topology show ip eigrp interfaces show ip eigrp neighbors show ip eigrp adjacency show ip eigrp topology show ip eigrp interfaces show ip eigrp neighbors ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following summation operation is performed on the bits to check an error-detecting code? Codec Checksum Coder-decoder None of these Attenuation Codec Checksum Coder-decoder None of these Attenuation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are TCP/IP protocols used at the Application layer of the OSI model?1. IP2. TCP3. Telnet4. FTP5. TFTP 1 and 3 1, 3 and 5 3, 4 and 5 All of these 1 and 3 1, 3 and 5 3, 4 and 5 All of these ANSWER DOWNLOAD EXAMIANS APP