Computer Networking
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

Layer 4 protocols
Layer 5 protocols
Layer 7 protocols
Layer 6 protocols
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding access lists applied to an interface?

You can apply only one access list on any interface.
One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
You can place as many access lists as you want on any interface until you run out of memory.
You can apply two access lists to any interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
RS-232-G

requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
None of these
is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment
specifies only the mechanical characteristics of an interface by providing a 25-pin connector
is an interface between two data circuit terminating equipment as examplified by a local and remote modem

ANSWER DOWNLOAD EXAMIANS APP