Computer Networking Which of the following network types have a designated router and a backup designated router assigned?1. Broadcast2. Point-to-point3. NBMA4. NBMA point-to-point All of these 1, 2 and 3 1 and 3 3 and 4 All of these 1, 2 and 3 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Networks where end user workstations are tied to LAN servers to share resources and application processing. Information super highway Business applications of telecommunications Internetworked enterprise Client/Server networks Information super highway Business applications of telecommunications Internetworked enterprise Client/Server networks ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data-link layer, in reference to the OSI model, specifies None of these data link procedures that provide for the exchange of data via frames that can be sent and received the interface between the X.25 network and packet mode device the virtual circuit interface to packet-switched service All of these None of these data link procedures that provide for the exchange of data via frames that can be sent and received the interface between the X.25 network and packet mode device the virtual circuit interface to packet-switched service All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which address is the loopback address? 255.255.255.255 127.0.0.1 None of these 127.0.0.0 0.0.0.1 255.255.255.255 127.0.0.1 None of these 127.0.0.0 0.0.0.1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or switch console port? Crossover with a CSU/DSU Crossover cable Straight-through Rolled Crossover with a CSU/DSU Crossover cable Straight-through Rolled ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 4 and 5 2 and 4 1 and 3 2, 3 and 5 4 and 5 2 and 4 1 and 3 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP