Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 3 and 4 2 only 1 only 1 and 2 3 and 4 2 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the minimum number of wires needed to send data over a serial communication link layer? 6 1 None of these 2 4 6 1 None of these 2 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network types have a designated router and a backup designated router assigned? 1. Broadcast 2. Point-to-point 3. NBMA 4. NBMA point-to-point All of these 1 and 3 1, 2 and 3 3 and 4 All of these 1 and 3 1, 2 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A characteristic of a multiprogramming system is: multiple CPUs simultaneous execution of program instructions from two applications concurrent processing of two or more programs All listed here None of these multiple CPUs simultaneous execution of program instructions from two applications concurrent processing of two or more programs All listed here None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking One important characteristic of the hub architecture of ARC-net is multiple virtual networks alternative routing access control and addressing None of these directionalized transmission multiple virtual networks alternative routing access control and addressing None of these directionalized transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. ANSWER DOWNLOAD EXAMIANS APP