Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase running erase startup delete nvram erase nvram erase running erase startup delete nvram erase nvram ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command loads a new version of the Cisco IOS into a router? copy flash tftp copy tftp flash copy ftp flash copy flash ftp copy flash tftp copy tftp flash copy ftp flash copy flash ftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 only 1, 3 and 4 3 and 4 1 only 3 only 1, 3 and 4 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? 2 SMTP IMAP DHCP POP3 2 SMTP IMAP DHCP POP3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.224.0 255,255.248.0 255.255.192.0 255.255.252.0 255.255.240.0 255.255.224.0 255,255.248.0 255.255.192.0 255.255.252.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at a data link level is achieved by cyclic redundancy codes Hamming codes bit stuffing equalization None of these cyclic redundancy codes Hamming codes bit stuffing equalization None of these ANSWER DOWNLOAD EXAMIANS APP