Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2 and 5 3 and 4 2, 3 and 5 1 and 3 2 and 5 3 and 4 2, 3 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /28 /30 /27 /29 /28 /30 /27 /29 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 1 and 3 4 and 5 2 and 4 2, 3 and 5 1 and 3 4 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?Corp#sh ip route[output cut]R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0C 192.168.20.0 is directly connected, Serial0/0C 192.168.214.0 is directly connected, FastEthernet0/0 The router will broadcast looking for the destination. They will all load-balance. The packet will be routed out the Fa0/0 interface. The packet will be discarded. The packet will be routed out the S0/0 interface. The router will broadcast looking for the destination. They will all load-balance. The packet will be routed out the Fa0/0 interface. The packet will be discarded. The packet will be routed out the S0/0 interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The frequency range : 300 kHz to 3 MHz is used for AM radio transmission microwave communications, satellite and radar None of these TV transmission FM radio transmission AM radio transmission microwave communications, satellite and radar None of these TV transmission FM radio transmission ANSWER DOWNLOAD EXAMIANS APP