Computer Networking How often are BPDUs sent from a layer 2 device? Every 10 minutes Every 30 seconds Every 2 seconds Never Every 10 minutes Every 30 seconds Every 2 seconds Never ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent switching loops in networks with redundant switched paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent routing loops in networks with redundant paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides? 192.168.168.129-190 192.168.168.129-191 192.168.168.128-192 192.168.168.128-190 192.168.168.129-190 192.168.168.129-191 192.168.168.128-192 192.168.168.128-190 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? None of these recoverable multiple-bit single-bit burst None of these recoverable multiple-bit single-bit burst ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a standard IP access list? access-list 110 permit host 1.1.1.1 access-list standard 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list 1 permit 172.16.10.1 255.255.0.0 access-list 110 permit host 1.1.1.1 access-list standard 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list 1 permit 172.16.10.1 255.255.0.0 ANSWER DOWNLOAD EXAMIANS APP