Computer Networking
A T-switch is used to

control how messages are passed between computers
transmit characters one at a time
None of these
echo every character that is received
rearrange the connections between computing equipment

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding access lists applied to an interface?

One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
You can place as many access lists as you want on any interface until you run out of memory.
You can apply only one access list on any interface.
You can apply two access lists to any interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?

Only extended VLAN's are allowed by default.
Only configured VLAN's are allowed on the link.
No VLAN's are allowed, you must configure each VLAN by hand.
By default, all VLANs are allowed on the trunk.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?

Router (config-if) # passive-interface
Router (config-router) # no routing updates
Router (config-if) # no routing
Router (config-router) # passive-interface s0

ANSWER DOWNLOAD EXAMIANS APP