Computer Networking
If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to?

172.16.45.0
172.16.45.8
172.16.45.12
172.16.45.4
192.168.10.126

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Token-Ring, because it uses a MAU
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Ethernet, because it is cabled using fiber-optic cable

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?

By default, all VLANs are allowed on the trunk.
No VLAN's are allowed, you must configure each VLAN by hand.
Only configured VLAN's are allowed on the link.
Only extended VLAN's are allowed by default.

ANSWER DOWNLOAD EXAMIANS APP