Computer Networking What command will display the forward/filter table? show run show mac address-table show mac filter-table show mac filter show run show mac address-table show mac filter-table show mac filter ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 5 protocols Layer 4 protocols None of these Layer 6 protocols Layer 7 protocols Layer 5 protocols Layer 4 protocols None of these Layer 6 protocols Layer 7 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the address after translation? Inside global Inside local Outside local Outside global Inside global Inside local Outside local Outside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The basic Ethernet design does not provide None of these automatic retransmission of a message access control multiple virtual networks addressing None of these automatic retransmission of a message access control multiple virtual networks addressing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network which is used for sharing data, software and hardware among several users owning microcomputers is called MAN None of these LAN VAN WAN MAN None of these LAN VAN WAN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link? Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. By default, all VLANs are allowed on the trunk. Only configured VLAN's are allowed on the link. Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. By default, all VLANs are allowed on the trunk. Only configured VLAN's are allowed on the link. ANSWER DOWNLOAD EXAMIANS APP