Computer Networking You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? reload copy start run replace run start copy run start reload copy start run replace run start copy run start ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 4 3, 4 and 5 2 and 3 1 and 3 1 and 4 3, 4 and 5 2 and 3 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches? Broadcast storms will occur on the switched network. The routing tables on the switches will not update. The switches will automatically load-balance between the two links. The MAC forward/filter table will not update on the switch. Broadcast storms will occur on the switched network. The routing tables on the switches will not update. The switches will automatically load-balance between the two links. The MAC forward/filter table will not update on the switch. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select correct type of line configuration: Multi-point Single point Link Dedicated point Multi-point Single point Link Dedicated point ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply two access lists to any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following specifies the network address and host address of the computer? The subnet mask None of these The TCP address The IP address The default gateway The subnet mask None of these The TCP address The IP address The default gateway ANSWER DOWNLOAD EXAMIANS APP