Computer Networking What is the name of the network topology in which there are bi-directional links between each possible node? Star Mesh Tree Ring None of these Star Mesh Tree Ring None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols uses both TCP and UDP? DNS SMTP FTP Telnet DNS SMTP FTP Telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?1. TFTP server software must be running on the router.2. TFTP server software must be running on your laptop.3. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable.4. The laptop must be on the same subnet as the router's Ethernet interface.5. The copy flash tftp command must be supplied the IP address of the laptop. 5 only 1, 3 and 4 2, 4 and 5 3 and 5 only 5 only 1, 3 and 4 2, 4 and 5 3 and 5 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe router functions? Internetwork communication All of these Packet filtering Path selection Packet switching Internetwork communication All of these Packet filtering Path selection Packet switching ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets? 255.255.255.192 255.255.255. 240 255.255.255.224 255.255.255.252 255.255.255.248 255.255.255.192 255.255.255. 240 255.255.255.224 255.255.255.252 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. You can apply only one access list on any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. ANSWER DOWNLOAD EXAMIANS APP