Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection? 150 100 None of these 80 30 150 100 None of these 80 30 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign? 255.255.240.0 255.255.252.0 255.255.248.0 255.255.255.255 255.255.224.0 255.255.240.0 255.255.252.0 255.255.248.0 255.255.255.255 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many subnets are available with a subnet mask of 248? 6 30 126 62 2 6 30 126 62 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which transmission mode is used for data communication along telephone lines? Synchronous None of these Parallel Serial Asynchronous Synchronous None of these Parallel Serial Asynchronous ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Cisco's Unified Wireless Solution provides a mesh solution. What devices do you absolutely need to purchase to run a Cisco solution?1. WCS2. Controller3. Access point4. Bridge 1 and 4 only 2 and 3 4 only 1 and 2 1 and 4 only 2 and 3 4 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP