Computer Networking
When creating a pool of global addresses, which of the following can be used instead of the netmask command?

/ (slash notation)
prefix-length
block-size
no mask

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You type the following command into the router and receive the following output:Router#show serial 0/0 ^% Invalid input detected at '^' marker.Why was this error message displayed?

The router does not have a serial0/0 interface.
Part of the command is missing.
You need to be in privileged mode.
You cannot have a space between serial and 0/0.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for Time-To-Line (TTL)?

a technique used in best-effort delivery system to avoid endlessly looping packets.
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
All of these
None of these

ANSWER DOWNLOAD EXAMIANS APP