Computer Networking
Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55

2 and 4
3 and 5
1 and 4
1, 4 and 6

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates?

Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface.
Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.
Configure many subinterfaces in the same subnet.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
MAC is

a method access control technique or multiple-access transmission media
a very common bit-oriented data link protocol issued to ISO.
a method of determining which device has access to the transmission medium at any time
network access standard for connecting stations to a circuit-switched network
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process.

2 and 3
1 and 3
3, 4 and 5
1 and 4

ANSWER DOWNLOAD EXAMIANS APP