Computer Networking Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?1. show version2. show protocols3. show interfaces4. show controllers5. show ip interface 2, 3 and 5 3 and 4 only None of these 1, 2 and 4 2, 3 and 5 3 and 4 only None of these 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? During high-traffic periods When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished During high-traffic periods When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? 224 240 192 252 248 224 240 192 252 248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking IGRP uses which of the following as default parameters for finding the best path to a remote network?1. Hop count2. MTU3. Cumulative interface delay4. STP5. Path bandwidth value 1 and 3 All of these 3 and 5 2, 3 and 5 1 and 3 All of these 3 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If one link fails, only that link is affected. All other links remain active. Which topology does this? Mesh topology Bus topology Physical topology Star topology Mesh topology Bus topology Physical topology Star topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation is the process of performing data encryption. Multiplexing various signals into high speed line signals converting digital signals to analog signals converting analog signals to digital signals performing data encryption. Multiplexing various signals into high speed line signals converting digital signals to analog signals converting analog signals to digital signals ANSWER DOWNLOAD EXAMIANS APP