Computer Networking Which are considered the methods of NAT?1. Static2. IP NAT pool3. Dynamic4. NAT double-translation5. Overload 1, 3 and 5 1 and 6 3 only All of these 1, 3 and 5 1 and 6 3 only All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will show you all the translations active on your router? show ip nat statistics debug ip nat show ip nat translations clear ip nat translations * show ip nat statistics debug ip nat show ip nat translations clear ip nat translations * ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11g standard? 2.4GHz 2.4Gbps 5Gbps 5GHz 2.4GHz 2.4Gbps 5Gbps 5GHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type show running-config and get this output:[output cut]Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login[output cut]What do the two numbers following the exec-timeout command mean? If no command has been typed in 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If no command has been typed in 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking TCP is: Connection orientated and unreliable None of these Operates at the Data Link layer Connection orientated and reliable Connectionless and unreliable Connection orientated and unreliable None of these Operates at the Data Link layer Connection orientated and reliable Connectionless and unreliable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 2 and 4 1 and 2 3 and 4 1 and 3 2 and 4 1 and 2 3 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP