Computer Networking To back up an IOS, what command will you use? copy flash tftp copy ios tftp backup IOS disk copy tftp flash copy flash tftp copy ios tftp backup IOS disk copy tftp flash ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols support VLSM, summarization, and discontiguous networking?1. RIPv12. IGRP3. EIGRP4. OSPF5. BGP6. RIPv2 3, 4 and 6 2 and 5 All of these 1 and 4 3, 4 and 6 2 and 5 All of these 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 1, 3 and 4 3 only 3 and 4 1 only 1, 3 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class A network? None of these 255.0.0.0 255.255.255.0.0 127.0.0.1 255.255.255.0 None of these 255.0.0.0 255.255.255.0.0 127.0.0.1 255.255.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? VMTP UDP X.25 SMTP None of these VMTP UDP X.25 SMTP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following best illustrates the default subnet mask for a class A,B, and C Network? None of these 0.0.0.0, 0.0.0.1, 0.0.1.1 255.255.255.0, 255.255.0.0, 255.0.0.0 255.0.0.0, 255.255.0.0, 255.255.255.0 255.255.0.0, 255.255.255.0, 255.255.255.255 None of these 0.0.0.0, 0.0.0.1, 0.0.1.1 255.255.255.0, 255.255.0.0, 255.0.0.0 255.0.0.0, 255.255.0.0, 255.255.255.0 255.255.0.0, 255.255.255.0, 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP