Computer Networking Which command will show you the IOS version running on your router? sh flash sh IOS sh running-config sh version sh flash sh IOS sh running-config sh version ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following series of commands will restrict Telnet access to the router? Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 4 Layer 7 Layer 3 Layer 2 Layer 4 Layer 7 Layer 3 Layer 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 3, 4 and 5 1 and 4 2 and 3 1 and 3 3, 4 and 5 1 and 4 2 and 3 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A logical address that identifies the workstation A physical address that is assigned by the manufacturer An alias for the computer name A physical address that is randomly assigned each time the computer is started The logical domain address for the workstation A logical address that identifies the workstation A physical address that is assigned by the manufacturer An alias for the computer name A physical address that is randomly assigned each time the computer is started The logical domain address for the workstation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring files from one machine to another? ARP FTP TCP RARP None of these ARP FTP TCP RARP None of these ANSWER DOWNLOAD EXAMIANS APP