Computer Networking
A T-switch is used to

echo every character that is received
transmit characters one at a time
control how messages are passed between computers
rearrange the connections between computing equipment
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding access lists applied to an interface?

You can apply only one access list on any interface.
You can place as many access lists as you want on any interface until you run out of memory.
You can apply two access lists to any interface.
One access list may be configured, per direction, for each layer 3 protocol configured on an interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure

2 and 4
2, 3 and 5
1 and 3
4 and 5

ANSWER DOWNLOAD EXAMIANS APP