Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV4 IPV5 IPV6 None of these IPV4 IPV5 IPV6 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2 and 4 4 and 5 2, 3 and 5 1 and 3 2 and 4 4 and 5 2, 3 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Thicknet coax Fiber-optic cable Thinnet coax Category 5 UTP cable Thicknet coax Fiber-optic cable Thinnet coax Category 5 UTP cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking We can receive data either through our television aerial or down our telephone lines and display this data on our television screen. What is the general name given to this process? None of these Telesoftware Videotex Teletext Viewdata None of these Telesoftware Videotex Teletext Viewdata ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications monitors available on the software market include BPL Telenet None of these TOTAL ENVIRON/1 BPL Telenet None of these TOTAL ENVIRON/1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What router command allows you to determine whether an IP access list is enabled on a particular interface? show ip interface show ip port show access-lists show access-lists interface show ip interface show ip port show access-lists show access-lists interface ANSWER DOWNLOAD EXAMIANS APP