Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 and 2 2 only 1 only 3 and 4 1 and 2 2 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A protocol is a set of rules governing a time sequence of events that must take place None of these between modems between an interface between peers across an interface None of these between modems between an interface between peers across an interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following transmission systems provides the highest data rate to an individual device Computer bus leased lines None of these Voice band modem Telephone lines Computer bus leased lines None of these Voice band modem Telephone lines ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class C network with a subnet mask of 192, how many subnets are available? 254 2 30 62 14 254 2 30 62 14 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transport layer protocol is connectionless. UDP FTP None of these NVT TCP UDP FTP None of these NVT TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question. 192.168.10.143 192.168.10.142 192.168.10.66 192.168.100.254 192.168.10.126 192.168.10.143 192.168.10.142 192.168.10.66 192.168.100.254 192.168.10.126 ANSWER DOWNLOAD EXAMIANS APP