Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? TCP ICMP ARP BootP TCP ICMP ARP BootP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 4 2 and 3 3, 4 and 5 1 and 3 1 and 4 2 and 3 3, 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use? 255.254.0.0 255.240.0.0 255.248.0.0 255.224.0.0 255.252.0.0 255.254.0.0 255.240.0.0 255.248.0.0 255.224.0.0 255.252.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You get a call from a network administrator who tells you that he typed the following into his router:Router (config) #router ospf 1Router (config-router) #network 10.0.0.0 255.0.0.0 area 0He tells you he still can't see any routes in the routing table. What configuration error did the administrator make? The AS configuration is wrong. The OSPF Process ID is incorrect. The OSPF area is wrong. The wildcard mask is incorrect. The AS configuration is wrong. The OSPF Process ID is incorrect. The OSPF area is wrong. The wildcard mask is incorrect. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate) 2400 bands 4800 bands 9600 bands DHCP Management Console 1200 bands 2400 bands 4800 bands 9600 bands DHCP Management Console 1200 bands ANSWER DOWNLOAD EXAMIANS APP