Computer Networking You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use? 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.252 255.255.255.248 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.252 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Flood the network with the frame Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Flood the network with the frame Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer: Fiber optic cables Telecommunications processors Cellular phone systems Telecommunications software Fiber optic cables Telecommunications processors Cellular phone systems Telecommunications software ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the correct cable that transport signals in the form of light: Coaxial Cable Shielded Twisted Pair cable Twisted-Pair cable Fiber optic cable Coaxial Cable Shielded Twisted Pair cable Twisted-Pair cable Fiber optic cable ANSWER DOWNLOAD EXAMIANS APP