Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.248 255.255.255.255 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.255 255.255.255.192 255.255.255.240 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What can cause a problem with communication with a client by name but not by IP address? Static files such as an LMHOSTS file or a DNS database Subnet mask The IP address None of these The default gateway Static files such as an LMHOSTS file or a DNS database Subnet mask The IP address None of these The default gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will create a dynamic pool named Todd that will provide you with 30 global addresses? ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0 ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224 ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240 ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224 ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0 ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224 ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240 ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement describes a spanning-tree network that has converged? All switch and bridge ports are either blocking or looping. All switch and bridge ports are in the forwarding state. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are either blocking or looping. All switch and bridge ports are in the forwarding state. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are assigned as either root or designated ports. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking ICMP (Internet Control Message Protocol) is a TCP/IP high level protocol for transferring files from one machine to another a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address None of these a protocol that handles error and control messages a protocol used to monitor computers a TCP/IP high level protocol for transferring files from one machine to another a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address None of these a protocol that handles error and control messages a protocol used to monitor computers ANSWER DOWNLOAD EXAMIANS APP