Computer Networking What is the port number for POP3? 80 90 110 49 80 90 110 49 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table? The IGRP route has fewer hops. RIP has a higher metric value for that route. IGRP has a faster update timer. IGRP has a lower administrative distance. The IGRP route has fewer hops. RIP has a higher metric value for that route. IGRP has a faster update timer. IGRP has a lower administrative distance. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many subnets are available with a subnet mask of 248? 126 6 30 2 62 126 6 30 2 62 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router? Flash should be erased and the router restarted. RAM should be erased and the router restarted. The new configuration should be entered and saved. NVRAM should be erased and the router restarted. Flash should be erased and the router restarted. RAM should be erased and the router restarted. The new configuration should be entered and saved. NVRAM should be erased and the router restarted. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.172.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to echo every character that is received transmit characters one at a time None of these control how messages are passed between computers rearrange the connections between computing equipment echo every character that is received transmit characters one at a time None of these control how messages are passed between computers rearrange the connections between computing equipment ANSWER DOWNLOAD EXAMIANS APP