Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase nvram erase running erase startup delete nvram erase nvram erase running erase startup delete nvram ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM? Wireless Dedicated T1 PPPoE DSL Frame Relay Wireless Dedicated T1 PPPoE DSL Frame Relay ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? 255.255.255.255 255.252.0.0 255.248.0.0 255.240.0.0 255.254.0.0 255.255.255.255 255.252.0.0 255.248.0.0 255.240.0.0 255.254.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet 3, 4, and 5 All of these 1 and 4 1, 2 and 3 3, 4, and 5 All of these 1 and 4 1, 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How often are BPDUs sent from a layer 2 device? Every 10 minutes Never Every 30 seconds Every 2 seconds Every 10 minutes Never Every 30 seconds Every 2 seconds ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Sending a file from your personal computer's primary memory or disk to another computer is called hang on logging on None of these downloading uploading hang on logging on None of these downloading uploading ANSWER DOWNLOAD EXAMIANS APP