Computer Networking Transmission of computerised data from one location to another is called data management data flow None of these data communication data transfer data management data flow None of these data communication data transfer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use? 255.255.240.0 255.255.224.0 255.255.255.0 255.255.248.0 255.255.192.0 255.255.240.0 255.255.224.0 255.255.255.0 255.255.248.0 255.255.192.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following communications service provides message preparation and transmission facilities? x400 Teletex None of these Fax Teletext x400 Teletex None of these Fax Teletext ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? 10 1200 None of these 12 120 10 1200 None of these 12 120 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To enable OSPFv3, which of the following would you use? Router1(config-if)# ipv6 router rip 1 Router1(config)# ipv6 router eigrp 10 Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 Router1(config-rtr)# no shutdown Router1(config-if)# ipv6 router rip 1 Router1(config)# ipv6 router eigrp 10 Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 Router1(config-rtr)# no shutdown ANSWER DOWNLOAD EXAMIANS APP