Computer Networking You want to run the new 802.1w on your switches. Which of the following would enable this protocol? Switch# spanning-tree mode rapid-pvst Switch# spanning-tree mode 802.1w Switch(config)# spanning-tree mode rapid-pvst Switch(config)# spanning-tree mode 802.1w Switch# spanning-tree mode rapid-pvst Switch# spanning-tree mode 802.1w Switch(config)# spanning-tree mode rapid-pvst Switch(config)# spanning-tree mode 802.1w ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following characteristic(s) is/are suited to the PSS applications? None of these All of these widely dispersed terminals and access to international packets switched services bursty traffic and low communications intensity Multiple remote host or applications accessed by a single local access circuit terminal and circuit None of these All of these widely dispersed terminals and access to international packets switched services bursty traffic and low communications intensity Multiple remote host or applications accessed by a single local access circuit terminal and circuit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?1. TFTP server software must be running on the router.2. TFTP server software must be running on your laptop.3. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable.4. The laptop must be on the same subnet as the router's Ethernet interface.5. The copy flash tftp command must be supplied the IP address of the laptop. 5 only 2, 4 and 5 1, 3 and 4 3 and 5 only 5 only 2, 4 and 5 1, 3 and 4 3 and 5 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The packets switching concept was first proposed in the late 1980s for the Defense Ministry of US. in the early 1960s for military communication systems, mainly to handle speech None of these All of these in the late 1950s for Defense Ministry of US in the late 1980s for the Defense Ministry of US. in the early 1960s for military communication systems, mainly to handle speech None of these All of these in the late 1950s for Defense Ministry of US ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean? The route has a delay of 16 microseconds. The route is inaccessible. They will all load-balance. The route is 16 hops away. The route is queued at 16 messages a second. The route has a delay of 16 microseconds. The route is inaccessible. They will all load-balance. The route is 16 hops away. The route is queued at 16 messages a second. ANSWER DOWNLOAD EXAMIANS APP