Computer Networking You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? copy run start replace run start reload copy start run copy run start replace run start reload copy start run ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What multicast addresses does EIGRPv6 use? FF02::A FF02::9 FF02::5 FF02::6 FF02::A FF02::9 FF02::5 FF02::6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Where are EIGRP successor routes stored? In the routing table and the neighbor table In the routing table and the topology table In the routing table only In the topology table only In the neighbor table only In the routing table and the neighbor table In the routing table and the topology table In the routing table only In the topology table only In the neighbor table only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? 120 1200 10 12 None of these 120 1200 10 12 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. "Line echo" occurs due to the impedance of the cable Network collisions occur Cable terminators do not reflect the signal properly Repeaters cannot increase the signal strength sufficiently Cable terminators do not absorb the signal properly "Line echo" occurs due to the impedance of the cable Network collisions occur Cable terminators do not reflect the signal properly Repeaters cannot increase the signal strength sufficiently Cable terminators do not absorb the signal properly ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP