Computer Networking
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?

You copied the wrong configuration into RAM.
The IOS became corrupted after the copy command was initiated.
You copied the configuration into flash memory instead.
The copy did not override the shutdown command in running-config.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring, because it uses a MAU
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Ethernet, because it is cabled using fiber-optic cable

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?R 192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0C 192.168.40.0/24 is directly connected, Serial0 172.16.0.0/24 is subnetted, 1 subnetsC 172.16.30.0 is directly connected, Loopback0R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0C 192.168.50.0/24 is directly connected, Ethernet0

10.0.0.0
All of them will be placed in the neighbor routing table
192.168.30.0
172.16.30.0

ANSWER DOWNLOAD EXAMIANS APP