Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only 3 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select? Token-Ring Right Bus Ethernet Star Token-Ring Right Bus Ethernet Star ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select correct type of line configuration: Single point Dedicated point Multi-point Link Single point Dedicated point Multi-point Link ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use? 255.255.255.224 255.255.255.0 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 255.255.255.0 255.255.255.252 255.255.255.248 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Three Two Four Five Six Three Two Four Five Six ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system? None of these Log-on procedure Identification procedure Security procedure Safeguard procedure None of these Log-on procedure Identification procedure Security procedure Safeguard procedure ANSWER DOWNLOAD EXAMIANS APP