Computer Networking Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224? Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #ip unnumbered Router (config) #no ip classful Router (config) #ip classless Router (config) #ip subnet-zero Router (config) #ip unnumbered ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured? The local DLCI on each subinterface An IP address on the physical interface The subinterface type as point-to-point The Frame Relay encapsulation on the physical interface PAP The local DLCI on each subinterface An IP address on the physical interface The subinterface type as point-to-point The Frame Relay encapsulation on the physical interface PAP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are connecting your access point and it is set to root. What does Extended Service Set ID mean? That you have multiple access points, but one is a repeater access point. That you have more than one access point and they are in separate SSIDs connected by a distribution system. That you have multiple access points, but they are placed physically in different buildings. That you have more than one access point and they are in the same SSID connected by a distribution system. That you have multiple access points, but one is a repeater access point. That you have more than one access point and they are in separate SSIDs connected by a distribution system. That you have multiple access points, but they are placed physically in different buildings. That you have more than one access point and they are in the same SSID connected by a distribution system. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost. KIK (1 + F) K I (K - P) 1/ (1 - F) P I (K + 1) None of these KIK (1 + F) K I (K - P) 1/ (1 - F) P I (K + 1) None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will display the CHAP authentication process as it occurs between two routers in the network? debug ppp authentication debug chap authentication show chap authentication show interface serial 0 debug ppp authentication debug chap authentication show chap authentication show interface serial 0 ANSWER DOWNLOAD EXAMIANS APP