1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
7

A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250

(with mask 255.255.255.0) is reserved for use by this new LAN switch, and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers.)
a. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode.
b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode.
c. The ip default-gateway 172.16.2.254 command in global configuration mode.
d. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1.
Computers and Technology
1 answer:
Andre45 [30]3 years ago
6 0

Answer:

B and C

Explanation:

The following commands are part of the required configuration that will be used in this case

B. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode.

C. The ip default-gateway 172.16.2.254 command in global configuration mode.

You might be interested in
One difference between setters and getters is: a setter has one or more parameters; a getter has no parameters.
tangare [24]
Boiiiiiiiii.
This is not a question
7 0
4 years ago
What is empowerment technology?
rosijanka [135]
It the use of technological devices such mobile phones and computer devices to help retain and locate information.
3 0
3 years ago
I forgot hahahahahahahahahahahaha
Nadusha1986 [10]

Answer:

Condensation

Explanation:

Condensation is the conversion of a vapor or gas to a liquid.

4 0
3 years ago
Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
vfiekz [6]

The numbers of  items that the user can include in the rule is the top or bottom 100 items only.

<h3>What is Top/Bottom Rules?</h3>

Top/Bottom Rules is known to be a rule where there is a premade form of conditional formatting which is often used in Excel to alter the set up  of cells in a range.

Note that the Top/Bottom Rules will allow a user to make changes to the top or bottom 100 items only as it only pertains to things that are up and those that are at the bottom.

Learn more about Top/Bottom Rules from

brainly.com/question/1862654

7 0
2 years ago
It’s safe to download files from the internet is you preform regular windows security updates; that is all you need to protect y
Goryan [66]
False if the user downloads files before scanning them with anti virus software anything bad can happen
7 0
4 years ago
Read 2 more answers
Other questions:
  • Write an application that allows a user to enter any number of student quiz scores until the user enters 99. If the score entere
    15·1 answer
  • __________ software helps the computer carry out its basic operating tasks.
    8·1 answer
  • You have begun a new project and want to keep all of the work you're doing on the project in its own directory. You will create
    8·2 answers
  • When deciding how to invest your money, which of the following is least important to know
    7·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • Will a large computer monitor have a clearer picture than using my plasma tv screen?
    9·1 answer
  • Write a C++ program that reads a temperature value and the letter C for Celsius or F for Fahrenheit. Print whether water is liqu
    14·1 answer
  • Describe the conventional method of data processing​
    12·2 answers
  • The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions:
    10·1 answer
  • Which measure is best to use to avoid outliers from corrupting the average?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!