Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? X.25 VMTP SMTP None of these UDP X.25 VMTP SMTP None of these UDP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands connect access list 110 inbound to interface ethernet0? Router(config)# ip access-list 110 in Router(config-if)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-group 110 in Router(config)# ip access-list 110 in Router(config-if)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-group 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What operates in the Data Link and the Network layer? Brouter Router NIC Bridge None of these Brouter Router NIC Bridge None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. "Line echo" occurs due to the impedance of the cable Network collisions occur Cable terminators do not reflect the signal properly Cable terminators do not absorb the signal properly Repeaters cannot increase the signal strength sufficiently "Line echo" occurs due to the impedance of the cable Network collisions occur Cable terminators do not reflect the signal properly Cable terminators do not absorb the signal properly Repeaters cannot increase the signal strength sufficiently ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer: Fiber optic cables Telecommunications software Cellular phone systems Telecommunications processors Fiber optic cables Telecommunications software Cellular phone systems Telecommunications processors ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 1, 4 and 6 1 and 4 2 and 4 3 and 5 1, 4 and 6 1 and 4 2 and 4 3 and 5 ANSWER DOWNLOAD EXAMIANS APP