Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 4 3 2 5 4 3 2 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many OSI layers are covered in the X.25 standard? two seven None of these three six two seven None of these three six ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode. 5 only 1, 2, and 5 2, 3 and 4 2 and 4 5 only 1, 2, and 5 2, 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? POP3 2 DHCP SMTP IMAP POP3 2 DHCP SMTP IMAP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Start and stop bits are used in serial communication for Error detection Slowing down the communication Synchronization Error correction Error detection Slowing down the communication Synchronization Error correction ANSWER DOWNLOAD EXAMIANS APP