Computer Networking Error detection at the data link level is achieved by Hamming Code Bit Stuffing Equalization Cyclic Redundancy Code Hamming Code Bit Stuffing Equalization Cyclic Redundancy Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets? 255.255.255.192 255.255.255.248 255.255.255. 240 255.255.255.224 255.255.255.252 255.255.255.192 255.255.255.248 255.255.255. 240 255.255.255.224 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default? IGRP route RIP route Any available route They will all load-balance. Static route IGRP route RIP route Any available route They will all load-balance. Static route ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the term used to describe addresses available on a DHCP server? Pools Notes Ranges Scopes None of these Pools Notes Ranges Scopes None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following types of connections can use full duplex?1. Hub to hub2. Switch to switch3. Host to host4. Switch to hub5. Switch to host 1, 2 and 4 3 and 5 2, 3 and 5 3 and 4 1, 2 and 4 3 and 5 2, 3 and 5 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 4 and 5 1 and 3 2 and 4 2, 3 and 5 4 and 5 1 and 3 2 and 4 ANSWER DOWNLOAD EXAMIANS APP