Computer Networking Which of the following encapsulates PPP frames in Ethernet frames and uses common PPP features like authentication, encryption, and compression? PPPoA PPP PPPoE Token Ring PPPoA PPP PPPoE Token Ring ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Bit Stuffing Equalization Hamming Code Cyclic Redundancy Code Bit Stuffing Equalization Hamming Code Cyclic Redundancy Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To manage the VLAN database across multiple switches To create collision domains To prevent switching loops in networks with redundant switched paths To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent switching loops in networks with redundant switched paths To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols, needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services? HDLC PPP 802.1 Frame Relay PAP HDLC PPP 802.1 Frame Relay PAP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link? No VLAN's are allowed, you must configure each VLAN by hand. Only configured VLAN's are allowed on the link. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. No VLAN's are allowed, you must configure each VLAN by hand. Only configured VLAN's are allowed on the link. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be? No IP traffic will be allowed out E0. Everything but email and Telnet will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Everything but email and Telnet will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. ANSWER DOWNLOAD EXAMIANS APP