Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase startup erase nvram erase running delete nvram erase startup erase nvram erase running delete nvram ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one? 255.255.255.240 225.255.254.0 255.255.255.252 255.255.252.0 255.255.255.240 225.255.254.0 255.255.255.252 255.255.252.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols support VLSM, summarization, and discontiguous networking?1. RIPv12. IGRP3. EIGRP4. OSPF5. BGP6. RIPv2 All of these 1 and 4 2 and 5 3, 4 and 6 All of these 1 and 4 2 and 5 3, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the maximum possible transmission rate? 24 Mbaud/sec None of these 6 Mband/sec 12 Mbaud/sec 1.5 Mbaud/sec 24 Mbaud/sec None of these 6 Mband/sec 12 Mbaud/sec 1.5 Mbaud/sec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer 1 devices can be used to enlarge the area covered by a single LAN segment?1. Switch2. NIC3. Hub4. Repeater5. RJ45 transceiver All of these 1 and 3 5 only 1 only 3 and 4 All of these 1 and 3 5 only 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP