Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? BootP ICMP ARP TCP BootP ICMP ARP TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The OCR reading unit attached to a POS terminal is called a wand cursor None of these All of these light pen wand cursor None of these All of these light pen ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used between E-Mail servers? SMTP FTP POP3 None of these SNMP SMTP FTP POP3 None of these SNMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead? FTP TFTP TELNET RARP None of these FTP TFTP TELNET RARP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 1, 3 and 5 3 and 5 2 and 6 2, 4 and 6 1, 3 and 5 3 and 5 2 and 6 2, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP