If the hubs in the graphic were replaced by switches, what would be virtually eliminated?

Refer to the exhibit. If the hubs in the graphic were replaced by switches, what would be virtually eliminated?A . broadcast domainsB . repeater domainsC . Ethernet collisionsD . signal amplificationE . Ethernet broadcastsView AnswerAnswer: C Explanation: Modern wired networks use a network switch to eliminate collisions. By connecting each...

February 17, 2019 No Comments READ MORE +

As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path?

Refer to the exhibit. As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three.)A . Hub1B . Switch1C . Router1D . Switch2E . Router2F . Switch3View AnswerAnswer: BDF Explanation: Switches use the destination MAC...

February 17, 2019 No Comments READ MORE +

Which of the following should be entered into the IP properties box for the sales server?

168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?A . IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9B . IP address:...

February 17, 2019 No Comments READ MORE +

What conclusions can be made about this design?

Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?A . This design will function as intended.B . Spanning-tree will need to be...

February 16, 2019 No Comments READ MORE +

Select two options which are security Issues which need to be modified before RouterA is used?

Hotspot Questions Select two options which are security Issues which need to be modified before RouterA is used? (Choose two.)A . unencrypted weak password is configured to protect privilege modeB . inappropriate wording in banner messageC . the virtual terminal lines have a weak password configuredD . virtual terminal lines...

February 16, 2019 No Comments READ MORE +

Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224?

Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224?A . 192.168.2.63B . 192.168.2.62C . 192.168.2.61D . 192.168.2.60E . 192.168.2.32View AnswerAnswer: B Explanation: With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63...

February 16, 2019 No Comments READ MORE +

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)A . layer 3 supportB . port securityC . redundant componentsD . VLANsE . PoEView AnswerAnswer: BD Explanation: The primary function of an access-layer is to provide network access to the end user. The hardware and...

February 15, 2019 No Comments READ MORE +

What is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network?

Refer to the exhibit. What is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network?A . router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2B . router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2C . router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1D . router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1View AnswerAnswer: D Explanation: The...

February 14, 2019 No Comments READ MORE +

Which statements are true regarding ICMP packets? (Choose two.)

Which statements are true regarding ICMP packets? (Choose two.)A . They acknowledge receipt of TCP segments.B . They guarantee datagram delivery.C . TRACERT uses ICMP packets.D . They are encapsulated within IP datagrams.E . They are encapsulated within UDP datagrams.View AnswerAnswer: CD Explanation: Ping may be used to find out...

February 14, 2019 No Comments READ MORE +

If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?

Refer to the exhibit. If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?A . 10.168.10.99B . 10.168.11.88C . A1:A1:A1:A1:A1:A1D . B2:B2:B2:B2:B2:B2E . C3:C3:C3:C3:C3:C3F . D4:D4:D4:D4:D4:D4View AnswerAnswer: E Explanation: When packets transfer from one host...

February 14, 2019 No Comments READ MORE +