Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement(s) about IPv6 addresses are true?1. Leading zeros are required.2. Two colons (::) are used to represent successive hexadecimal fields of zeros.3. Two colons (::) are used to separate fields.4. A single interface will have multiple IPv6 addresses of different types. 2 and 4 1, 3 and 4 All of these 1 and 3 2 and 4 1, 3 and 4 All of these 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An anticipated result from multiprogramming operations is: All of these better scheduling of work the handling of more jobs None of these reduced computer idle time All of these better scheduling of work the handling of more jobs None of these reduced computer idle time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command will permit SMTP mail to only host 1.1.1.1? access-list 110 permit tcp any host 1.1.1.1 eq smtp access-list 110 permit ip smtp host 1.1.1.1 access-list 10 permit smtp host 1.1.1.1 access-list 10 permit tcp any host 1.1.1.1 eq smtp access-list 110 permit tcp any host 1.1.1.1 eq smtp access-list 110 permit ip smtp host 1.1.1.1 access-list 10 permit smtp host 1.1.1.1 access-list 10 permit tcp any host 1.1.1.1 eq smtp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network that requires human intervention of route signals is called a bus network T-switched network None of these star network ring network bus network T-switched network None of these star network ring network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you want to disable STP on a port connected to a server, which command would you use? spanning-tree portfast disable spanning-tree spanning-tree off spanning-tree security spanning-tree portfast disable spanning-tree spanning-tree off spanning-tree security ANSWER DOWNLOAD EXAMIANS APP