Computer Networking The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are to assign address to private network DTEs A and B both adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) None of these to assign address to private network DTEs A and B both adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are advantages of using NAT?1. Translation introduces switching path delays.2. Conserves legally registered addresses.3. Causes loss of end-to-end IP traceability.4. Increases flexibility when connecting to the Internet.5. Certain applications will not function with NAT enabled.6. Reduces address overlap occurrence. 5 and 6 3, 5 and 6 1, 3 and 4 2, 4 and 6 5 and 6 3, 5 and 6 1, 3 and 4 2, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link? No VLAN's are allowed, you must configure each VLAN by hand. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. Only configured VLAN's are allowed on the link. No VLAN's are allowed, you must configure each VLAN by hand. By default, all VLANs are allowed on the trunk. Only extended VLAN's are allowed by default. Only configured VLAN's are allowed on the link. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is X.25 None of these X.400 X.75 X.21 X.25 None of these X.400 X.75 X.21 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? Host-to-Host Application Network Access Internet Host-to-Host Application Network Access Internet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 2 only 3 and 4 1 only 1 and 2 2 only 3 and 4 1 only ANSWER DOWNLOAD EXAMIANS APP