Computer Networking Which switching technology reduces the size of a broadcast domain? STP VLANs ISL 802.1Q STP VLANs ISL 802.1Q ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HMP (Host Monitoring Protocol) is: a protocol that handles error and control messages a protocol used to monitor computers None of these a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a TCP/IP high level protocol for transferring files from one machine to another. a protocol that handles error and control messages a protocol used to monitor computers None of these a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a TCP/IP high level protocol for transferring files from one machine to another. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following series of commands will restrict Telnet access to the router? Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Layer 2 switching provides which of the following?1. Hardware-based bridging (ASIC)2. Wire speed3. Low latency4. Low cost 1, 2 and 4 2 and 4 1 and 3 All of these 1, 2 and 4 2 and 4 1 and 3 All of these ANSWER DOWNLOAD EXAMIANS APP