Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 4 3 5 2 4 3 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? / (slash notation) block-size no mask prefix-length / (slash notation) block-size no mask prefix-length ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding VLANs? You should not have more than 10 switches in the same VTP domain. You must have at least two VLANs defined in every Cisco switched network. VTP is used to send VLAN information to switches in a configured VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. You should not have more than 10 switches in the same VTP domain. You must have at least two VLANs defined in every Cisco switched network. VTP is used to send VLAN information to switches in a configured VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? None of these Layer 5 protocols Layer 4 protocols Layer 7 protocols Layer 6 protocols None of these Layer 5 protocols Layer 4 protocols Layer 7 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer: Switching alternating Extranets Inter organizational networks Bandwidth alternatives None of these Switching alternating Extranets Inter organizational networks Bandwidth alternatives None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? The updated information will replace the existing routing table entry. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. They will all load-balance. The updated information will be added to the existing routing table. The update will be ignored and no further action will occur. The updated information will replace the existing routing table entry. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence. They will all load-balance. The updated information will be added to the existing routing table. The update will be ignored and no further action will occur. ANSWER DOWNLOAD EXAMIANS APP