Computer Networking A communication network which is used by large organizations over regional, national or global area is called WAN None of these MAN LAN Intranet WAN None of these MAN LAN Intranet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the first octet range for a class B IP address? 127 - 191 1 - 127 128 - 255 192 - 223 128 - 191 127 - 191 1 - 127 128 - 255 192 - 223 128 - 191 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers often waste the output link capacity while statistical multiplexers optimize its use ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 1 and 3 2, 3 and 5 4 and 5 2 and 4 1 and 3 2, 3 and 5 4 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are benefits of VLANs?1. They increase the size of collision domains.2. They allow logical grouping of users by function.3. They can enhance network security.4. They increase the size of broadcast domains while decreasing the number of collision domains.5. They simplify switch administration.6. They increase the number of broadcast domains while decreasing the size of the broadcast domains. 1, 3 and 5 2 and 4 1 and 5 2, 3 and 6 1, 3 and 5 2 and 4 1 and 5 2, 3 and 6 ANSWER DOWNLOAD EXAMIANS APP