Computer Networking Which are considered the methods of NAT?1. Static2. IP NAT pool3. Dynamic4. NAT double-translation5. Overload All of these 3 only 1 and 6 1, 3 and 5 All of these 3 only 1 and 6 1, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class C network? 127.0.0.1 255.0.0.0 255.255.0.0 None of these 255.255.255.0 127.0.0.1 255.0.0.0 255.255.0.0 None of these 255.255.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent switching loops in networks with redundant switched paths To create collision domains To manage the VLAN database across multiple switches To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments To prevent switching loops in networks with redundant switched paths To create collision domains To manage the VLAN database across multiple switches To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is a layer 2 protocol used to maintain a loop-free network? CDP VTP STP RIP CDP VTP STP RIP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? 155, 0x9B 159, 0x9F 157, 0x9D 185, 0xB9 155, 0x9B 159, 0x9F 157, 0x9D 185, 0xB9 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk all switchport mode trunk switchport trunk on trunk on trunk all switchport mode trunk switchport trunk on trunk on ANSWER DOWNLOAD EXAMIANS APP