Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 2 only 1 only 3 and 4 1 and 2 2 only 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data communication support should include, but is not restricted to terminal support, electronic mail and voice grams. All of these file and database access file transfer and transaction processing terminal support, electronic mail and voice grams. All of these file and database access file transfer and transaction processing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.255 255.255.255.224 255.255.255.248 255.255.255.240 255.255.255.192 255.255.255.255 255.255.255.224 255.255.255.248 255.255.255.240 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Virtual Private Network OSI Network Server Network operating system Virtual Private Network OSI Network Server Network operating system ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? repeater gateway bridge None of these hub repeater gateway bridge None of these hub ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings? IPCONFIG TRACERT PING ARP None of these IPCONFIG TRACERT PING ARP None of these ANSWER DOWNLOAD EXAMIANS APP