CIS 175 RANK Great Stories/cis175rank.com CIS 175 RANK Great Stories/cis175rank.com | Page 11

25. What is the actual distance of 10Base 2? 26. You can configure user authentication at Layer 2 of the OSI. What IEEE standard would you use for this? 27. What is the IEEE standard for PoE? 28. How is a switch selected as a root bridge for spanning tree if the bridge priorities are the same? 29. What is the purpose of the trunk in the diagram? 30. There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? 31. How many bytes in an IEEE 802.1Q VLAN tag? 32. A more efficient design which involve the logical separate of a switch ports into different broadcast domains is known as a ________. 33. What is the result of the binary conversion in the example below? 34. Which IP addresses assignment method leads to less administrative efforts to Information Technology professionals? 35. What is the result of the binary conversion in the example below? 36. The diagram below shows an example of what kind of transmission? 37. How many bits in an IPv4 address?