Computer Networking Which of the following communications lines is best suited to interactive processing applications? full-duplex lines mixed band channels simplex lines None of these narrowband channels full-duplex lines mixed band channels simplex lines None of these narrowband channels ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer. Fiber-optic UTP PSTN TI STP Fiber-optic UTP PSTN TI STP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link? No VLAN's are allowed, you must configure each VLAN by hand. By default, all VLANs are allowed on the trunk. Only configured VLAN's are allowed on the link. Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. By default, all VLANs are allowed on the trunk. Only configured VLAN's are allowed on the link. Only extended VLAN's are allowed by default. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 4 and 5 1 and 3 2 and 4 2, 3 and 5 4 and 5 1 and 3 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A protocol is a set of rules governing a time sequence of events that must take place between peers between an interface across an interface between modems None of these between peers between an interface across an interface between modems None of these ANSWER DOWNLOAD EXAMIANS APP