Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 3 and 4 1 and 3 1 and 2 2 and 4 3 and 4 1 and 3 1 and 2 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 4, 5 and 6 2, 4, and 5 2, 3 and 4 1, 2 and 6 4, 5 and 6 2, 4, and 5 2, 3 and 4 1, 2 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the destination host after translation? Outside global Inside local Outside local Inside global Outside global Inside local Outside local Inside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To test the IP stack on your local host, which IP address would you ping? 1.0.0.127 127.0.0.255 127.0.0.0 127.0.0.1 1.0.0.127 127.0.0.255 127.0.0.0 127.0.0.1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HOSTS file entries are limited to how many characters? 255 Unlimited None of these 500 8 255 Unlimited None of these 500 8 ANSWER DOWNLOAD EXAMIANS APP