Computer Networking Which of the following commands sets a trunk port on a 2960 switch? switchport mode trunk trunk on switchport trunk on trunk all switchport mode trunk trunk on switchport trunk on trunk all ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?R 192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0C 192.168.40.0/24 is directly connected, Serial0 172.16.0.0/24 is subnetted, 1 subnetsC 172.16.30.0 is directly connected, Loopback0R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0C 192.168.50.0/24 is directly connected, Ethernet0 192.168.30.0 10.0.0.0 All of them will be placed in the neighbor routing table 172.16.30.0 192.168.30.0 10.0.0.0 All of them will be placed in the neighbor routing table 172.16.30.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking X.21 is a very common bit-oriented data link protocol issued by ISO a method access control technique for multiple-access transmission media None of these a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network a very common bit-oriented data link protocol issued by ISO a method access control technique for multiple-access transmission media None of these a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question. 192.168.10.143 192.168.10.126 192.168.10.142 192.168.10.66 192.168.100.254 192.168.10.143 192.168.10.126 192.168.10.142 192.168.10.66 192.168.100.254 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will show you whether a DTE or a DCE cable is plugged into serial 0? sh int s0 sh int serial 0 show controllers serial 0 show serial 0 controllers sh int s0 sh int serial 0 show controllers serial 0 show serial 0 controllers ANSWER DOWNLOAD EXAMIANS APP