Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? delete nvram erase nvram erase running erase startup delete nvram erase nvram erase running erase startup ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches? The switches will automatically load-balance between the two links. The routing tables on the switches will not update. The MAC forward/filter table will not update on the switch. Broadcast storms will occur on the switched network. The switches will automatically load-balance between the two links. The routing tables on the switches will not update. The MAC forward/filter table will not update on the switch. Broadcast storms will occur on the switched network. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum distance running the lowest data rate for 802.11b? About 100 feet About 175 feet About 350 feet About 300 feet About 100 feet About 175 feet About 350 feet About 300 feet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Correct method for full duplex mode of communication is: One device sends and other device receives and vic Both stations can transmit and receive data at the None of these One device can send other device can only accepts. One device sends and other device receives and vic Both stations can transmit and receive data at the None of these One device can send other device can only accepts. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router? (config-if)# ip access-group 110 in (config)# ip access-group 110 in (config-if)# blocksales ip access-list in (config-if)# ip access-group Blocksales in (config-if)# ip access-group 110 in (config)# ip access-group 110 in (config-if)# blocksales ip access-list in (config-if)# ip access-group Blocksales in ANSWER DOWNLOAD EXAMIANS APP