Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase nvram delete nvram erase running erase startup erase nvram delete nvram erase running erase startup ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs. 3, 5 and 6 2 and 4 1, 2 and 4 1 and 6 3, 5 and 6 2 and 4 1, 2 and 4 1 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ houses the switches in token ring. NIC nine-pin connector MAU transceiver None of these NIC nine-pin connector MAU transceiver None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When data is encapsulated, which is the correct order? Data, segment, packet, frame, bit Data, segment, frame, packet, bit Data, frame, packet, segment, bit Segment, data, packet, frame, bit Data, segment, packet, frame, bit Data, segment, frame, packet, bit Data, frame, packet, segment, bit Segment, data, packet, frame, bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are like private addresses in IPv4 in that they are not meant to be routed. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP