Computer Networking Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? VTP ISL STP DHCP VTP ISL STP DHCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is a stub network? A network that has only one entry and exit point. A network with more than one exit and entry point. A network with only one entry and no exit point. A network with more than one exit point. A network that has only one entry and exit point. A network with more than one exit and entry point. A network with only one entry and no exit point. A network with more than one exit point. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To manage the VLAN database across multiple switches To provide a mechanism for network monitoring in switched environments To create collision domains To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To manage the VLAN database across multiple switches To provide a mechanism for network monitoring in switched environments To create collision domains To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries? data link layer transport layer None of these physical layer network layer data link layer transport layer None of these physical layer network layer ANSWER DOWNLOAD EXAMIANS APP