Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 1 only 1 and 2 3 and 4 2 only 1 only 1 and 2 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? None of these UDP SMTP X.25 VMTP None of these UDP SMTP X.25 VMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The configuration register setting of 0x2102 provides what function to a router? Tells the router to look in NVRAM for the boot sequence Boots the IOS from a TFTP server Tells the router to boot into ROM monitor mode Provides password recovery Tells the router to look in NVRAM for the boot sequence Boots the IOS from a TFTP server Tells the router to boot into ROM monitor mode Provides password recovery ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 2 only 1 and 2 3 only 1, 3 and 4 2 only 1 and 2 3 only 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following does not allow multiple users or devices to share one communications line? multipplexer controller None of these concentrator doubleplexer multipplexer controller None of these concentrator doubleplexer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? Fax None of these Modem Scanner Keyboard Fax None of these Modem Scanner Keyboard ANSWER DOWNLOAD EXAMIANS APP