Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 5 protocols None of these Layer 7 protocols Layer 4 protocols Layer 6 protocols Layer 5 protocols None of these Layer 7 protocols Layer 4 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? ISL DHCP VTP STP ISL DHCP VTP STP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name of the network topology in which there are bi-directional links between each possible node? None of these Mesh Ring Star Tree None of these Mesh Ring Star Tree ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? 4 6 2 3 None of these 4 6 2 3 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the followings is used in communications is referred to as unshielded twisted-pair (UTP)? None of these Coaxial cable Fiber-optic cable Twisted-pair cable None of these Coaxial cable Fiber-optic cable Twisted-pair cable ANSWER DOWNLOAD EXAMIANS APP