Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? FTP SMTP None of these SNMP RPC FTP SMTP None of these SNMP RPC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 7 protocols None of these Layer 6 protocols Layer 4 protocols Layer 5 protocols Layer 7 protocols None of these Layer 6 protocols Layer 4 protocols Layer 5 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? frame-relay arp frame-relay lmi-type frame-relay interface-dci frame-relay map frame-relay arp frame-relay lmi-type frame-relay interface-dci frame-relay map ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 3 and 5 1 and 4 1, 4 and 6 2 and 4 3 and 5 1 and 4 1, 4 and 6 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM? Frequency-division multiple access None of these Amplitude modulation Frequency-shift keying Frequency modulation Frequency-division multiple access None of these Amplitude modulation Frequency-shift keying Frequency modulation ANSWER DOWNLOAD EXAMIANS APP