Computer Networking Which file transfer protocol uses UDP? FTP NFS TELNET TFTP None of these FTP NFS TELNET TFTP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment? For no more than two subnets None of these For no subnets Unique to that subnet only For different subnets For no more than two subnets None of these For no subnets Unique to that subnet only For different subnets ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 4 and 5 1 and 3 2 and 4 2, 3 and 5 4 and 5 1 and 3 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?R 192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0C 192.168.40.0/24 is directly connected, Serial0 172.16.0.0/24 is subnetted, 1 subnetsC 172.16.30.0 is directly connected, Loopback0R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0C 192.168.50.0/24 is directly connected, Ethernet0 192.168.30.0 172.16.30.0 10.0.0.0 All of them will be placed in the neighbor routing table 192.168.30.0 172.16.30.0 10.0.0.0 All of them will be placed in the neighbor routing table ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In CRC there is no error if the remainder at the receiver is _____. None of these equal to the remainder at the sender the quotient at the sender zero nonzero None of these equal to the remainder at the sender the quotient at the sender zero nonzero ANSWER DOWNLOAD EXAMIANS APP