Computer Networking FDDI is a ring network star network mesh network None of these bus based network ring network star network mesh network None of these bus based network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer 1 devices can be used to enlarge the area covered by a single LAN segment?1. Switch2. NIC3. Hub4. Repeater5. RJ45 transceiver 5 only All of these 1 only 3 and 4 1 and 3 5 only All of these 1 only 3 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are benefits of VLANs?1. They increase the size of collision domains.2. They allow logical grouping of users by function.3. They can enhance network security.4. They increase the size of broadcast domains while decreasing the number of collision domains.5. They simplify switch administration.6. They increase the number of broadcast domains while decreasing the size of the broadcast domains. 1, 3 and 5 2, 3 and 6 1 and 5 2 and 4 1, 3 and 5 2, 3 and 6 1 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You get a call from a network administrator who tells you that he typed the following into his router:Router (config) #router ospf 1Router (config-router) #network 10.0.0.0 255.0.0.0 area 0He tells you he still can't see any routes in the routing table. What configuration error did the administrator make? The OSPF area is wrong. The AS configuration is wrong. The OSPF Process ID is incorrect. The wildcard mask is incorrect. The OSPF area is wrong. The AS configuration is wrong. The OSPF Process ID is incorrect. The wildcard mask is incorrect. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data communication support should include, but is not restricted to file transfer and transaction processing terminal support, electronic mail and voice grams. All of these file and database access file transfer and transaction processing terminal support, electronic mail and voice grams. All of these file and database access ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 ANSWER DOWNLOAD EXAMIANS APP