Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 3 and 4 2 only 1 only 1 and 2 3 and 4 2 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following files is used for NetBIOS name resolution? ARP FQDN None of these HOSTS LMHOSTS ARP FQDN None of these HOSTS LMHOSTS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is None of these a method of determining which device has access to the transmission medium at any time a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method of determining which device has access to the transmission medium at any time a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A software that allows a personal computer to pretend it as a terminal is bulletin board None of these terminal emulation auto-dialing modem bulletin board None of these terminal emulation auto-dialing modem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are true regarding OSPF areas?1. You must have separate loopback interfaces configured in each area.2. The numbers you can assign an area go up to 65,535.3. The backbone area is also called area 0.4. If your design is hierarchical, then you don't need multiple areas.5. All areas must connect to area 0. 3, 4 and 5 3 and 4 only 1 and 2 only 1 only 3, 4 and 5 3 and 4 only 1 and 2 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many non-overlapping channels are available with 802.11a? 3 23 12 40 3 23 12 40 ANSWER DOWNLOAD EXAMIANS APP