Computer Networking Which of the following are TCP/IP protocols used at the Application layer of the OSI model?1. IP2. TCP3. Telnet4. FTP5. TFTP All of these 3, 4 and 5 1 and 3 1, 3 and 5 All of these 3, 4 and 5 1 and 3 1, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment? None of these Unique to that subnet only For different subnets For no more than two subnets For no subnets None of these Unique to that subnet only For different subnets For no more than two subnets For no subnets ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer. None of these Duplicate pools Duplicate default gateways Duplicate addresses Duplicate subnets None of these Duplicate pools Duplicate default gateways Duplicate addresses Duplicate subnets ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: modulation None of these synchronizing synchronizing demodulation modulation None of these synchronizing synchronizing demodulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network types have a designated router and a backup designated router assigned? 1. Broadcast 2. Point-to-point 3. NBMA 4. NBMA point-to-point 1, 2 and 3 All of these 1 and 3 3 and 4 1, 2 and 3 All of these 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP