Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? delete nvram erase nvram erase running erase startup delete nvram erase nvram erase running erase startup ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How often are BPDUs sent from a layer 2 device? Every 2 seconds Every 30 seconds Every 10 minutes Never Every 2 seconds Every 30 seconds Every 10 minutes Never ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You telnet to a router and make your necessary changes; now you want to end the Telnet session. What command do you type in? disable exit close disconnect disable exit close disconnect ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is None of these X.21 X.400 X.25 X.75 None of these X.21 X.400 X.25 X.75 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2 and 5 2, 3 and 5 1 and 3 3 and 4 2 and 5 2, 3 and 5 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP