Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 only 1 and 2 3 and 4 2 only 1 only 1 and 2 3 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is required to communicate between two computers? All of these communications software access to transmission medium protocol communications hardware All of these communications software access to transmission medium protocol communications hardware ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 3 and 5 2 and 6 1, 3 and 5 2, 4 and 6 3 and 5 2 and 6 1, 3 and 5 2, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The first step in troubleshooting many problems is to verify which of the following? None of these The WINS server is running The BDC is operable TCP/IP is installed correctly on the client The subnet mask is valid None of these The WINS server is running The BDC is operable TCP/IP is installed correctly on the client The subnet mask is valid ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 1, 2 and 6 4, 5 and 6 2, 3 and 4 2, 4, and 5 1, 2 and 6 4, 5 and 6 2, 3 and 4 2, 4, and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign? 255.255.240.0 255.255.248.0 255.255.224.0 255.255.255.255 255.255.252.0 255.255.240.0 255.255.248.0 255.255.224.0 255.255.255.255 255.255.252.0 ANSWER DOWNLOAD EXAMIANS APP