If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?A . half-duplex operationB . broadcast stormsC . network segmentationD . multicastingView AnswerAnswer: B Explanation: A broadcast storm can consume sufficient network resources so as to render the...
If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed?
Refer to the exhibit. If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed?A . Router1>B . Router1#C . Router2>D . Router2#View AnswerAnswer: C Explanation: The Ctrl-Shift-6 x command suspends the telnet session and hence the prompt will again...
What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address?
What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address?A . drops the frameB . sends out a Layer 3 broadcast messageC . sends a message to the router requesting the addressD . sends out an ARP...
What is the cause of this problem?
Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the...
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)A . Allow unrestricted access to the console or VTY ports.B . Use a firewall to restrict access from the outside to the network devices.C . Always use Telnet to access the device...
Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets?
Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets?A . 1B . 2C . 4D . 8E . 252F . 254View AnswerAnswer: B Explanation: /30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100...
How many collision domains are present in this network?
Refer to the exhibit. All devices attached to the network are shown. How many collision domains are present in this network?A . 2B . 3C . 6D . 9E . 15View AnswerAnswer: E Explanation: A switch uses a separate collision domain for each port so there are a total of...
What are possible reasons for this problem?
R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two)A . All of the routers need to be configured for backbone Area 1.B . R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with...
Including the address on the Routed Ethernet interface, how many hosts can have IP addresses on the LAN to which Routed is connected?
Including the address on the Routed Ethernet interface, how many hosts can have IP addresses on the LAN to which Routed is connected?A . 6B . 30C . 62D . 126View AnswerAnswer: A Explanation: This is a /29 address, so there are 6 usable IP’s on this subnet.
What will the switch do with the frame?
A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MAC address. What will the switch do with the frame?A . drop the frameB . forward it out of all ports except the one that received itC ....