Computer Networking Which of the following TCP/IP protocol is used for remote terminal connection service? FTP UDP None of these RARP TELNET FTP UDP None of these RARP TELNET ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to rearrange the connections between computing equipment echo every character that is received control how messages are passed between computers transmit characters one at a time None of these rearrange the connections between computing equipment echo every character that is received control how messages are passed between computers transmit characters one at a time None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be? No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. Everything but email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. Everything but email and Telnet will be allowed out E0. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 1 and 3 2 and 4 3 and 4 1 and 2 1 and 3 2 and 4 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you use either Telnet or FTP, which is the highest layer you are using to transmit data? Presentation Application Transport Session Presentation Application Transport Session ANSWER DOWNLOAD EXAMIANS APP