Computer Networking After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called? None of these Facsimile Word processor Electronic mail Telex None of these Facsimile Word processor Electronic mail Telex ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be? Email and Telnet will be allowed in E0. Everything but email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Email and Telnet will be allowed out E0. Email and Telnet will be allowed in E0. Everything but email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Email and Telnet will be allowed out E0. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a synchronous modem, the receive equalizer is known as None of these compromise equalizer adaptive equalizer impairment equalizer statistical equalizer None of these compromise equalizer adaptive equalizer impairment equalizer statistical equalizer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HMP (Host Monitoring Protocol) is: a TCP/IP high level protocol for transferring files from one machine to another. a protocol used to monitor computers a protocol that handles error and control messages a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address None of these a TCP/IP high level protocol for transferring files from one machine to another. a protocol used to monitor computers a protocol that handles error and control messages a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 2, 4 and 6 1, 3 and 5 3 and 5 2 and 6 2, 4 and 6 1, 3 and 5 3 and 5 2 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one? 255.255.255.240 255.255.255.252 255.255.252.0 225.255.254.0 255.255.255.240 255.255.255.252 255.255.252.0 225.255.254.0 ANSWER DOWNLOAD EXAMIANS APP