Computer Networking A T-switch is used to echo every character that is received transmit characters one at a time control how messages are passed between computers rearrange the connections between computing equipment None of these echo every character that is received transmit characters one at a time control how messages are passed between computers rearrange the connections between computing equipment None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is separated by a subnet mask? Network ID and host ID Subnets DHCP scopes None of these Domains Network ID and host ID Subnets DHCP scopes None of these Domains ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? STP DHCP VTP ISL STP DHCP VTP ISL ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Internet-like networks between a company and its business partners. Select the best fit for answer: Inter organizational networks Switching alternating Extranets Bandwidth alternatives Inter organizational networks Switching alternating Extranets Bandwidth alternatives ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2 and 4 2, 3 and 5 1 and 3 4 and 5 2 and 4 2, 3 and 5 1 and 3 4 and 5 ANSWER DOWNLOAD EXAMIANS APP