Computer Networking How often are BPDUs sent from a layer 2 device? Never Every 2 seconds Every 30 seconds Every 10 minutes Never Every 2 seconds Every 30 seconds Every 10 minutes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?1. Neighbor table2. STP table3. Topology table4. DUAL table 2 only 4 only 1 and 3 All of these 2 only 4 only 1 and 3 All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs. 3, 5 and 6 1 and 6 2 and 4 1, 2 and 4 3, 5 and 6 1 and 6 2 and 4 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches? The switches will automatically load-balance between the two links. Broadcast storms will occur on the switched network. The routing tables on the switches will not update. The MAC forward/filter table will not update on the switch. The switches will automatically load-balance between the two links. Broadcast storms will occur on the switched network. The routing tables on the switches will not update. The MAC forward/filter table will not update on the switch. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method access control technique or multiple-access transmission media a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method access control technique or multiple-access transmission media ANSWER DOWNLOAD EXAMIANS APP