Computer Networking How many OSI layers are covered in the X.25 standard? six None of these three two seven six None of these three two seven ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 3 only 1, 3 and 4 3 and 4 1 only 3 only 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The synchronous modems are more costly than the asynchronous modems because they transmit the data with stop and start bits. None of these they contain clock recovery circuits they produce large volume of data they operate with a larger bandwidth they transmit the data with stop and start bits. None of these they contain clock recovery circuits they produce large volume of data they operate with a larger bandwidth ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)? None of these 08-Dec 01-Apr 13-14 05-Jul None of these 08-Dec 01-Apr 13-14 05-Jul ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts? 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many hosts are attached to each of the local area networks at your site? None of these 64 128 254 256 None of these 64 128 254 256 ANSWER DOWNLOAD EXAMIANS APP