Identify the true statement regarding subnetting?
A.) Allows for more host address
B.) Borrow bits from the network portion of the address
C.) Allows for unlimited number of networks
D.) Borrow bits from the host portion of the address
Answer / guest
Answer: D
Subnetting involves borrowing bits for the host portion of
the address
to be used to subnet addressing.
| Is This Answer Correct ? | 7 Yes | 0 No |
Which of the following are examples of the Session Layer? A.) TCP B.) RPC C.) SQL D.) NFS E.) Token Ring
Which three functions are supported by connection oriented servkps? (Choose three) A. connection parameters are synchronized B. any loss or duplication of packets can be corrected C. the data packet is independently routed and the service does not guarantee the packet will be processed in order D. a data communication path is established between a requesting entity and the peer device on the remote end system
what is Bandwidth capping
Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
How many (minimum and maximum) ports are present in a router?
Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer
When you use the Cisco IOS command show configuration on a router which part of the output shows the specific conferred IP addresses and shored masks? A. the IP host table B. the interfaces output C. each section of the output D. the global configuration statements E. the section under the autonomous system number
How do you disable advanced editing? A.) terminal editing B.) terminal no editing C.) disable editing D.) no terminal editing
Explain what is overlaod?
Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group