Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When data is encapsulated, which is the correct order? Data, frame, packet, segment, bit Data, segment, packet, frame, bit Data, segment, frame, packet, bit Segment, data, packet, frame, bit Data, frame, packet, segment, bit Data, segment, packet, frame, bit Data, segment, frame, packet, bit Segment, data, packet, frame, bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the first octet range for a class C IP address? 192 - 226 192 - 223 128 - 191 1 - 126 192 - 255 192 - 226 192 - 223 128 - 191 1 - 126 192 - 255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following services use TCP?1. DHCP2. SMTP3. HTTP4. TFTP5. FTP 1 and 2 2, 3 and 5 1, 2 and 4 1, 3 and 4 1 and 2 2, 3 and 5 1, 2 and 4 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking End-to-end connectivity is provided from host-to-host in: Transport layer None of these Network layer Session layer Data link layer Transport layer None of these Network layer Session layer Data link layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. ICMP guarantees datagram delivery.2. ICMP can provide hosts with information about network problems.3. ICMP is encapsulated within IP datagrams.4. ICMP is encapsulated within UDP datagrams. 2 and 3 All of these 1 and 4 1 only 2 and 3 All of these 1 and 4 1 only ANSWER DOWNLOAD EXAMIANS APP