Computer Networking
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

Layer 7 protocols
Layer 6 protocols
None of these
Layer 5 protocols
Layer 4 protocols

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?

Add the destination to the MAC address table and then forward the frame
Flood the network with the frame
Add the source address and port to the MAC address table and forward the frame out the destination port
Discard it and send an error message back to the originating host

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

access-list 10 deny 192.168.0.0 0.0.31.255
access-list 10 deny 192.168.160.0 0.0.191.255
access-list 10 deny 192.168.160.0 0.0.31.255
access-list 10 deny 192.168.160.0 255.255.224.0

ANSWER DOWNLOAD EXAMIANS APP