Computer Networking What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? Dynamic PAT Static NAT Dynamic PAT Static NAT ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What multicast addresses does EIGRPv6 use? FF02::9 FF02::6 FF02::5 FF02::A FF02::9 FF02::6 FF02::5 FF02::A ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link? No VLAN's are allowed, you must configure each VLAN by hand. Only configured VLAN's are allowed on the link. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. Only configured VLAN's are allowed on the link. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which fields are contained within an IEEE Ethernet frame header?1. Source and destination MAC address2. Source and destination network address3. Source and destination MAC address and source and destination network address4. FCS field 2 only 2 and 3 only 1 and 4 3 only 2 only 2 and 3 only 1 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP