Computer Networking
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?

255.255.255.248
255.255.255.252
255.255.255.224
255.255.255.240
255.255.255.192

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

All of these
a technique used in best-effort delivery systems to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding VTP?

VTP is on by default with a domain name of Cisco on all Cisco switches.
All switches are VTP transparent by default.
All switches are VTP clients by default.
All switches are VTP servers by default.

ANSWER DOWNLOAD EXAMIANS APP