Computer Networking Which of the following might be used by a company to satisfy its growing communications needs? All of these concentrator multiplexer controller front-end processor All of these concentrator multiplexer controller front-end processor ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are TCP/IP protocols used at the Application layer of the OSI model?1. IP2. TCP3. Telnet4. FTP5. TFTP 1, 3 and 5 All of these 1 and 3 3, 4 and 5 1, 3 and 5 All of these 1 and 3 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? single-bit recoverable None of these burst multiple-bit single-bit recoverable None of these burst multiple-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Communication between computers is almost always None of these series parallel serial direct parallel None of these series parallel serial direct parallel ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following communications modes support two-way traffic but in only one direction of a time? None of these half-duplex three-quarters duplex full-of the above simplex None of these half-duplex three-quarters duplex full-of the above simplex ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP