Computer Networking Which command would you use to apply an access list to a router interface? ip access-list 101 out access-list ip 101 in ip access-group 101 in access-group ip 101 in ip access-list 101 out access-list ip 101 in ip access-group 101 in access-group ip 101 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The interactive transmission of data within a time sharing system may be best suited to None of these half-duplex lines full-duplex lines biflex-line simplex lines None of these half-duplex lines full-duplex lines biflex-line simplex lines ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 2, 3 and 5 1 and 3 2 and 5 3 and 4 2, 3 and 5 1 and 3 2 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement describes a spanning-tree network that has converged? All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are either blocking or looping. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are either blocking or looping. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are in the forwarding state. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which type of OSPF network will elect a backup designated router?1. Broadcast multi-access2. Non-broadcast multi-access3. Point-to-point4. Broadcast multipoint None of these 3 and 4 1 and 2 3 only None of these 3 and 4 1 and 2 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 2 and 3 1 and 4 1 and 3 3, 4 and 5 2 and 3 1 and 4 1 and 3 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP