Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only 3 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A required characteristic of an online real-time system is: All of these more than one CPU None of these offline batch processing no delay in processing All of these more than one CPU None of these offline batch processing no delay in processing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Identify the odd term amongst the following group: Microwaves Twisted pair wire Optical fibre Coaxial cable None of these Microwaves Twisted pair wire Optical fibre Coaxial cable None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue? Router> show ip route Router> ping Router> show interface Router> trace Router> show ip route Router> ping Router> show interface Router> trace ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router? show access-lists show ip access-lists show ip interface Ethernet 0 show interface Ethernet 0 show access-lists show ip access-lists show ip interface Ethernet 0 show interface Ethernet 0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 16 15 30 14 16 15 30 14 ANSWER DOWNLOAD EXAMIANS APP