Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 2 only 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the first octet range for a class A IP address? 128 - 191 192 - 255 1 - 126 192 - 223 1 - 127 128 - 191 192 - 255 1 - 126 192 - 223 1 - 127 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a network with dozens of switches, how many root bridges would you have? 1 5 2 12 1 5 2 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network with a subnet of 172.16.17.0/22. Which is the valid host address? 172.16.0.1 255.255.240.0 172.16.17.1 255.255.255.252 172.16.18.255 255.255.252.0 172.16.20.1 255.255.254.0 172.16.0.1 255.255.240.0 172.16.17.1 255.255.255.252 172.16.18.255 255.255.252.0 172.16.20.1 255.255.254.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 3 4 5 2 3 4 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Establishing a virtual connection is functionally equivalent to Physically connecting a DTE and DCE Placing a modem prior to a conversation None of these Placing a telephone call prior to a conversation Connecting as virtual memory Physically connecting a DTE and DCE Placing a modem prior to a conversation None of these Placing a telephone call prior to a conversation Connecting as virtual memory ANSWER DOWNLOAD EXAMIANS APP