Computer Networking If you delete the contents of NVRAM and reboot the router, what mode will you be in? Privileged mode Global mode NVRAM loaded mode Setup mode Privileged mode Global mode NVRAM loaded mode Setup mode ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2 and 5 3 and 4 1 and 3 2, 3 and 5 2 and 5 3 and 4 1 and 3 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? Server-based Ethernet Star Peer-to-peer Token-Ring Server-based Ethernet Star Peer-to-peer Token-Ring ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? 64 - bits 48 - bits 16 - bits None of these 32 - bits 64 - bits 48 - bits 16 - bits None of these 32 - bits ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 3 5 4 2 3 5 4 ANSWER DOWNLOAD EXAMIANS APP