Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? prefix-length no mask / (slash notation) block-size prefix-length no mask / (slash notation) block-size ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question. 192.168.10.142 192.168.10.66 192.168.100.254 192.168.10.143 192.168.10.126 192.168.10.142 192.168.10.66 192.168.100.254 192.168.10.143 192.168.10.126 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the address of the router? None of these The IP address The default gateway The TCP address The subnet mask None of these The IP address The default gateway The TCP address The subnet mask ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols support VLSM, summarization, and discontiguous networking?1. RIPv12. IGRP3. EIGRP4. OSPF5. BGP6. RIPv2 1 and 4 All of these 2 and 5 3, 4 and 6 1 and 4 All of these 2 and 5 3, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? SMTP 2 POP3 IMAP DHCP SMTP 2 POP3 IMAP DHCP ANSWER DOWNLOAD EXAMIANS APP