Computer Networking Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224? Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class C network with a subnet mask of 192, how many subnets are available? 2 62 14 254 30 2 62 14 254 30 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Why does the data communication industry use the layered OSI reference model?1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.4. It encourages industry standardization by defining what functions occur at each layer of the model. 3 only 2 and 3 1 and 4 1 only 3 only 2 and 3 1 and 4 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use UDP?1. DHCP2. SMTP3. SNMP4. FTP5. HTTP6. TFTP All of these 2 and 4 1, 3 and 6 1, 2 and 4 All of these 2 and 4 1, 3 and 6 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply only one access list on any interface. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can place as many access lists as you want on any interface until you run out of memory. ANSWER DOWNLOAD EXAMIANS APP