Computer Networking What is the subnetwork number of a host with an IP address of 172.16.66.0/21? 172.16.36.0 172.16.48.0 172.16.0.0 172.16.64.0 172.16.36.0 172.16.48.0 172.16.0.0 172.16.64.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You get a call from a network administrator who tells you that he typed the following into his router:Router (config) #router ospf 1Router (config-router) #network 10.0.0.0 255.0.0.0 area 0He tells you he still can't see any routes in the routing table. What configuration error did the administrator make? The OSPF Process ID is incorrect. The wildcard mask is incorrect. The OSPF area is wrong. The AS configuration is wrong. The OSPF Process ID is incorrect. The wildcard mask is incorrect. The OSPF area is wrong. The AS configuration is wrong. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are true regarding OSPF areas?1. You must have separate loopback interfaces configured in each area.2. The numbers you can assign an area go up to 65,535.3. The backbone area is also called area 0.4. If your design is hierarchical, then you don't need multiple areas.5. All areas must connect to area 0. 3, 4 and 5 1 and 2 only 1 only 3 and 4 only 3, 4 and 5 1 and 2 only 1 only 3 and 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal? Bridges Switches configured with VLANs Switches Managed hubs Bridges Switches configured with VLANs Switches Managed hubs ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Five Three Four Two Six Five Three Four Two Six ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 3 1 and 2 3 and 4 2 and 4 1 and 3 1 and 2 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP