Computer Networking The EIA-232 interface has _____ pins. 30 25 24 20 None of these 30 25 24 20 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs. 3, 5 and 6 1 and 6 1, 2 and 4 2 and 4 3, 5 and 6 1 and 6 1, 2 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? UDP VMTP None of these SMTP X.25 UDP VMTP None of these SMTP X.25 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission one bit or any odd number of bits inverted in a byte during transmission None of these two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission one bit or any odd number of bits inverted in a byte during transmission None of these two bits or any even number of bits inverted in a block during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Time sharing CSMA/CD Switched repeaters Token passing Collision detection Time sharing CSMA/CD Switched repeaters Token passing Collision detection ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 1 and 3 2 and 4 4 and 5 2, 3 and 5 1 and 3 2 and 4 4 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP