Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 only 1 and 2 2 only 3 and 4 1 only 1 and 2 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The X.25 standard specifies a data bit rate technique for dial access DTE/DCE interface None of these technique for start-stop data data bit rate technique for dial access DTE/DCE interface None of these technique for start-stop data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The packets switching concept was first proposed All of these in the late 1950s for Defense Ministry of US in the late 1980s for the Defense Ministry of US. None of these in the early 1960s for military communication systems, mainly to handle speech All of these in the late 1950s for Defense Ministry of US in the late 1980s for the Defense Ministry of US. None of these in the early 1960s for military communication systems, mainly to handle speech ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Where are EIGRP successor routes stored? In the topology table only In the routing table and the neighbor table In the routing table only In the neighbor table only In the routing table and the topology table In the topology table only In the routing table and the neighbor table In the routing table only In the neighbor table only In the routing table and the topology table ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The OCR reading unit attached to a POS terminal is called a All of these None of these light pen cursor wand All of these None of these light pen cursor wand ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as mail gateway Gateways bridges None of these User Agent mail gateway Gateways bridges None of these User Agent ANSWER DOWNLOAD EXAMIANS APP