Computer Networking
Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?

Telemailing
Teleconferencing
Teletalking
None of these
Telemeeting

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which statement describes a spanning-tree network that has converged?

All switch and bridge ports are assigned as either root or designated ports.
All switch and bridge ports are in either the forwarding or blocking state.
All switch and bridge ports are in the forwarding state.
All switch and bridge ports are either blocking or looping.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding VLANs?

VTP is used to send VLAN information to switches in a configured VTP domain.
All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches.
You must have at least two VLANs defined in every Cisco switched network.
You should not have more than 10 switches in the same VTP domain.

ANSWER DOWNLOAD EXAMIANS APP