Computer Networking Which of the following connectivity devices is used to extend a network on a purely mechanical basis? Switch Router Active hub Gateway 802.6 Switch Router Active hub Gateway 802.6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What multicast addresses does EIGRPv6 use? FF02::A FF02::9 FF02::6 FF02::5 FF02::A FF02::9 FF02::6 FF02::5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 2 and 6 3 and 5 1, 3 and 5 2, 4 and 6 2 and 6 3 and 5 1, 3 and 5 2, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a synchronous modem, the digital-to-analog converter transmits signal to the demodulator modulator terminal None of these equalizer demodulator modulator terminal None of these equalizer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to? 172.16.45.4 172.16.45.0 172.16.45.8 172.16.45.12 192.168.10.126 172.16.45.4 172.16.45.0 172.16.45.8 172.16.45.12 192.168.10.126 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 ANSWER DOWNLOAD EXAMIANS APP