Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 2 and 4 1 and 3 1 and 2 3 and 4 2 and 4 1 and 3 1 and 2 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following condition is used to transmit two packets over a medium at the same time? None of these Contention Synchronous Collision Asynchronous None of these Contention Synchronous Collision Asynchronous ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command-line tool is included with every Microsoft TCP/IP client? None of these WINS DHCP PING WINIPCFG None of these WINS DHCP PING WINIPCFG ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.255 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is used for modulation and demodulation? modem gateway None of these multiplexer protocols modem gateway None of these multiplexer protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A physical address that is randomly assigned each time the computer is started The logical domain address for the workstation An alias for the computer name A physical address that is assigned by the manufacturer A logical address that identifies the workstation A physical address that is randomly assigned each time the computer is started The logical domain address for the workstation An alias for the computer name A physical address that is assigned by the manufacturer A logical address that identifies the workstation ANSWER DOWNLOAD EXAMIANS APP