Computer Networking Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? STP VTP DHCP ISL STP VTP DHCP ISL ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Token-Ring, because it uses a MAU Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Token-Ring, because it uses a MAU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Bandlimited signal is All of these simultaneous transmission of data to a number of stations None of these a signal all of whose energy is contained within a finite frequency range transmission of signals without modulation All of these simultaneous transmission of data to a number of stations None of these a signal all of whose energy is contained within a finite frequency range transmission of signals without modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Demodulation is a process of multiplexing various signals into one high speed line signals performing data description. converting digital to analog signals converting analog to digital signals multiplexing various signals into one high speed line signals performing data description. converting digital to analog signals converting analog to digital signals ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 ANSWER DOWNLOAD EXAMIANS APP