Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 3 4 5 2 3 4 5 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 1, 3 and 5 3 and 5 2, 4 and 6 2 and 6 1, 3 and 5 3 and 5 2, 4 and 6 2 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator needs to configure a router with a distance-vector protocol that allows classless routing. Which of the following satisfies those requirements? IGRP EIGRP IS-IS RIPv1 OSPF IGRP EIGRP IS-IS RIPv1 OSPF ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Your company is running IGRP using an AS of 10. You want to configure EIGRP on the network but want to migrate slowly to EIGRP and don't want to configure redistribution. What command would allow you to migrate over time to EIGRP without configuring redistribution? router igrp combine eigrp 10 router eigrp 10 redistribute igrp router eigrp 10 router eigrp 11 router igrp combine eigrp 10 router eigrp 10 redistribute igrp router eigrp 10 router eigrp 11 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many hosts are available at each site with a subnet mask of 248? 1,022 4,094 8,190 16,382 2,046 1,022 4,094 8,190 16,382 2,046 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? Star Peer-to-peer Token-Ring Ethernet Server-based Star Peer-to-peer Token-Ring Ethernet Server-based ANSWER DOWNLOAD EXAMIANS APP