Computer Networking How many hosts are attached to each of the local area networks at your site? 64 None of these 254 256 128 64 None of these 254 256 128 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Networks where end user workstations are tied to LAN servers to share resources and application processing. Client/Server networks Information super highway Business applications of telecommunications Internetworked enterprise Client/Server networks Information super highway Business applications of telecommunications Internetworked enterprise ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Synchronous protocols None of these allow faster transmission than asynchronous protocols do are generally used by personal computers transmit characters one at a time are more reliable None of these allow faster transmission than asynchronous protocols do are generally used by personal computers transmit characters one at a time are more reliable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs. 1 and 6 2 and 4 3, 5 and 6 1, 2 and 4 1 and 6 2 and 4 3, 5 and 6 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ houses the switches in token ring. NIC None of these nine-pin connector MAU transceiver NIC None of these nine-pin connector MAU transceiver ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. ANSWER DOWNLOAD EXAMIANS APP