Computer Networking
Which of the following technique is used for encapsulation?

None of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
All of these
a technique used in best-effort delivery systems to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following characteristic(s) is/are suited to the PSS applications?

bursty traffic and low communications intensity
Multiple remote host or applications accessed by a single local access circuit terminal and circuit
None of these
All of these
widely dispersed terminals and access to international packets switched services

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?

Router (config-if) # passive-interface
Router (config-router) # passive-interface s0
Router (config-router) # no routing updates
Router (config-if) # no routing

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

access-list 10 deny 172.16.48.0 0.0.15.255
access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.64.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP