Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding VLANs? All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. VTP is used to send VLAN information to switches in a configured VTP domain. You must have at least two VLANs defined in every Cisco switched network. You should not have more than 10 switches in the same VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. VTP is used to send VLAN information to switches in a configured VTP domain. You must have at least two VLANs defined in every Cisco switched network. You should not have more than 10 switches in the same VTP domain. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router? show ip interface Ethernet 0 show ip access-lists show access-lists show interface Ethernet 0 show ip interface Ethernet 0 show ip access-lists show access-lists show interface Ethernet 0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 1 and 2 3 and 4 1 only 4 only 1 and 2 3 and 4 1 only 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? config mem wr mem copy running-config startup-config copy running backup config mem wr mem copy running-config startup-config copy running backup ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer 1 devices can be used to enlarge the area covered by a single LAN segment?1. Switch2. NIC3. Hub4. Repeater5. RJ45 transceiver 1 only 3 and 4 All of these 1 and 3 5 only 1 only 3 and 4 All of these 1 and 3 5 only ANSWER DOWNLOAD EXAMIANS APP