Computer Networking Which of the following commands displays the configurable parameters and statistics of all interfaces on a router? show interfaces show startup-config show versions show running-config show interfaces show startup-config show versions show running-config ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost. KIK (1 + F) None of these P I (K + 1) 1/ (1 - F) K I (K - P) KIK (1 + F) None of these P I (K + 1) 1/ (1 - F) K I (K - P) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation? 0x2100 0x2142 0x2102 0x2101 0x2100 0x2142 0x2102 0x2101 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding VLANs? VTP is used to send VLAN information to switches in a configured VTP domain. You should not have more than 10 switches in the same VTP domain. You must have at least two VLANs defined in every Cisco switched network. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. VTP is used to send VLAN information to switches in a configured VTP domain. You should not have more than 10 switches in the same VTP domain. You must have at least two VLANs defined in every Cisco switched network. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to transmit characters one at a time control how messages are passed between computers None of these rearrange the connections between computing equipment echo every character that is received transmit characters one at a time control how messages are passed between computers None of these rearrange the connections between computing equipment echo every character that is received ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. ANSWER DOWNLOAD EXAMIANS APP