Computer Networking Which of the following network access standard is used for connecting stations to a packet-switched network? X.21 X.3 X.75 None of these X.25 X.21 X.3 X.75 None of these X.25 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will display all the EIGRP feasible successor routes known to a router? show ip eigrp summary show ip routes * show ip eigrp topology show ip eigrp adjacencies show ip eigrp summary show ip routes * show ip eigrp topology show ip eigrp adjacencies ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk on trunk all switchport trunk on switchport mode trunk trunk on trunk all switchport trunk on switchport mode trunk ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: data control network hierarchical network None of these spider network ring network data control network hierarchical network None of these spider network ring network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates? Router (config-if) # passive-interface Router (config-if) # no routing Router (config-router) # no routing updates Router (config-router) # passive-interface s0 Router (config-if) # passive-interface Router (config-if) # no routing Router (config-router) # no routing updates Router (config-router) # passive-interface s0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use? 255.255.240.0 255.255.224.0 255.255.255.0 255.255.248.0 255.255.192.0 255.255.240.0 255.255.224.0 255.255.255.0 255.255.248.0 255.255.192.0 ANSWER DOWNLOAD EXAMIANS APP