Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk all switchport trunk on trunk on switchport mode trunk trunk all switchport trunk on trunk on switchport mode trunk ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be? Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. Everything but email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. Everything but email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the wrong configuration into RAM. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. The copy did not override the shutdown command in running-config. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? Global network Paperless office None of these Electronic newspaper Electronic mail Global network Paperless office None of these Electronic newspaper Electronic mail ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Twisted pair wires, coaxial cable, optical fiber cables are the examples of: Wireless Media None of these Both A & B Wired Media Wireless Media None of these Both A & B Wired Media ANSWER DOWNLOAD EXAMIANS APP