Computer Networking You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? SMTP DHCP SNMP ARP SMTP DHCP SNMP ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method of determining which device has access to the transmission medium at any time a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method of determining which device has access to the transmission medium at any time a method access control technique or multiple-access transmission media ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement describes a spanning-tree network that has converged? All switch and bridge ports are either blocking or looping. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are either blocking or looping. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are assigned as either root or designated ports. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A modem that is attached to the telephone system by jamming the phone's handset into two flexible receptacles in the coupler? None of these bridge acoustic coupler time-division multiplexer gateway None of these bridge acoustic coupler time-division multiplexer gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 2 and 4 4 and 5 1 and 3 2, 3 and 5 2 and 4 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the result of segmenting a network with a bridge (switch)?1. It increases the number of collision domains.2. It decreases the number of collision domains.3. It increases the number of broadcast domains.4. It decreases the number of broadcast domains.5. It makes smaller collision domains.6. It makes larger collision domains. 2, 3 and 5 1 and 5 3, 4 and 6 1, 3 and 6 2, 3 and 5 1 and 5 3, 4 and 6 1, 3 and 6 ANSWER DOWNLOAD EXAMIANS APP