Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 2 only 1 only 3 and 4 1 and 2 2 only 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 4 only 1 and 2 1 only 3 and 4 4 only 1 and 2 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11g standard? 2.4Gbps 2.4GHz 5GHz 5Gbps 2.4Gbps 2.4GHz 5GHz 5Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum distance running the lowest data rate for 802.11g? About 350 feet About 100 feet About 175 feet About 300 feet About 350 feet About 100 feet About 175 feet About 300 feet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called? Facsimile Word processor Electronic mail Telex None of these Facsimile Word processor Electronic mail Telex None of these ANSWER DOWNLOAD EXAMIANS APP