Computer Networking Which of the following medium access control technique is used for bus/tree? MAC token ring token bus CSMA None of these MAC token ring token bus CSMA None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Where are EIGRP successor routes stored? In the neighbor table only In the routing table and the neighbor table In the routing table and the topology table In the topology table only In the routing table only In the neighbor table only In the routing table and the neighbor table In the routing table and the topology table In the topology table only In the routing table only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the illustration from the previous question, what would be the IP address of SO if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question. 192.168.10.30 192.168.10.127 192.168.10.24 192.168.10.62 192.168.10.30 192.168.10.127 192.168.10.24 192.168.10.62 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? ISL DHCP STP VTP ISL DHCP STP VTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP