Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To provide a mechanism for network monitoring in switched environments To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To create collision domains To manage the VLAN database across multiple switches To provide a mechanism for network monitoring in switched environments To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To create collision domains To manage the VLAN database across multiple switches ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The X.25 standard specifies a DTE/DCE interface data bit rate None of these technique for start-stop data technique for dial access DTE/DCE interface data bit rate None of these technique for start-stop data technique for dial access ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer: Telecommunications processors Cellular phone systems Fiber optic cables Telecommunications software Telecommunications processors Cellular phone systems Fiber optic cables Telecommunications software ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding VLANs? You should not have more than 10 switches in the same VTP domain. You must have at least two VLANs defined in every Cisco switched network. VTP is used to send VLAN information to switches in a configured VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. You should not have more than 10 switches in the same VTP domain. You must have at least two VLANs defined in every Cisco switched network. VTP is used to send VLAN information to switches in a configured VTP domain. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? recoverable single-bit multiple-bit None of these burst recoverable single-bit multiple-bit None of these burst ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which are considered the methods of NAT?1. Static2. IP NAT pool3. Dynamic4. NAT double-translation5. Overload 1 and 6 All of these 3 only 1, 3 and 5 1 and 6 All of these 3 only 1, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP