Computer Networking Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead? TELNET TFTP FTP None of these RARP TELNET TFTP FTP None of these RARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Identify the odd term amongst the following group: Twisted pair wire Microwaves None of these Coaxial cable Optical fibre Twisted pair wire Microwaves None of these Coaxial cable Optical fibre ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: synchronizing demodulation modulation synchronizing None of these synchronizing demodulation modulation synchronizing None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Why does the data communication industry use the layered OSI reference model?1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.4. It encourages industry standardization by defining what functions occur at each layer of the model. 1 only 3 only 2 and 3 1 and 4 1 only 3 only 2 and 3 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a standard IP access list? access-list 1 permit 172.16.10.1 255.255.0.0 access-list 110 permit host 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list standard 1.1.1.1 access-list 1 permit 172.16.10.1 255.255.0.0 access-list 110 permit host 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list standard 1.1.1.1 ANSWER DOWNLOAD EXAMIANS APP