Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 2 only 1 and 2 3 and 4 1 only 2 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A subdivision of main storage created by operational software is referred to as a: time-shared program divided core compartment partition None of these time-shared program divided core compartment partition None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs. 1, 2 and 4 2 and 4 3, 5 and 6 1 and 6 1, 2 and 4 2 and 4 3, 5 and 6 1 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The amount of uncertainty in a system of symbol is called loss None of these Bandwidth Entropy Quantum loss None of these Bandwidth Entropy Quantum ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as None of these bridges Gateways User Agent mail gateway None of these bridges Gateways User Agent mail gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a client-server model? All of these None of these DNS TELNET FTP All of these None of these DNS TELNET FTP ANSWER DOWNLOAD EXAMIANS APP